Deeplinkshttps://www.eff.org/ar/rss/updates.xml/national-security-letters
EFF's Deeplinks Blog: Noteworthy news from around the internetarLibrarians, Act Now to Protect Your Users (Before It’s Too Late)https://www.eff.org/ar/deeplinks/2016/12/librarians-act-now-protect-your-users-its-too-late
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Books checked out from a library and terms searched on library computers can reveal a teenager’s questions about sexual orientation, a neighbor’s religious leanings, or a student’s political interests. Libraries across the country, particularly public libraries, make it part of their mission to serve the most vulnerable and underserved user groups, including users who are homeless, unemployed, or recent migrants or refugees. And when government agents come looking, these library users need librarians to <a href="https://www.theguardian.com/books/2016/nov/30/library-user-data-government-surveillance-donald-trump">have their back.</a></p>
<p>Libraries and librarians <a href="https://www.thenation.com/article/librarians-versus-nsa/">have long been</a> stalwart guardians of the rights of free expression and inquiry. As part of their <a href="http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy">profession</a>, librarians protect their users’ ability to access even the most controversial information and ideas free from government scrutiny. Since the passage of the Patriot Act in particular, librarians have <a href="https://www.theguardian.com/us-news/2016/jan/13/us-library-records-purged-data-privacy">purged user records</a> when necessary to fight against unconstitutional government demands and <a href="https://www.eff.org/press/releases/internet-archive-received-national-security-letter-fbi-misinformation-about">pushed back</a> against (unconstitutional) National Security Letters (NSLs). Librarians also stood with EFF and the ACLU when we worked to pass the <a href="https://www.eff.org/press/archives/2011/10/03">California Reader Privacy Act</a> in 2011.</p>
<p>With the recent election of President-elect Donald Trump, many libraries are rightfully worried about a renewed threat to their users’ privacy. If the incoming administration sticks to its promises to identify and <a href="http://www.npr.org/sections/thetwo-way/2016/11/13/501921177/donald-trump-says-hell-deport-2-3-million-people-once-in-office">deport millions of people</a>, <a href="http://www.nytimes.com/politics/first-draft/2015/11/20/donald-trump-says-hed-absolutely-require-muslims-to-register/">monitor individuals</a> based on their religious beliefs, and <a href="http://www.politico.com/blogs/on-media/2016/02/donald-trump-libel-laws-219866">expand libel laws</a>, for example, libraries could receive unprecedented government requests for information on their users.</p>
<p>To that end, we recommend libraries ensure they’re taking the following steps as soon as possible to protect their users’ intellectual privacy. In addition, libraries have to think beyond their own actions and take steps to ensure that all of their third-party vendors provide the same level of protections to users that libraries themselves do.</p>
<h3>1. Limit collection and retention of user information</h3>
<p>The less information you collect about your users, the less you have to surrender. The best policy is to collect the minimum amount of information necessary to provide a particular service, and don’t retain that information any longer than necessary. For example, delete check-out information as soon as a book is returned. Further, make a regular habit of purging your logs (including circulation records, event attendance records, computer use and activity logs, search records, Wi-Fi connection logs, database searches, etc.) using a <a href="https://ssd.eff.org/en/module/how-delete-your-data-securely-mac-os-x">secure</a> <a href="https://ssd.eff.org/en/module/how-delete-your-data-securely-windows">deletion</a> utility. If you do need to retain certain records—for example, usage records for resource allocation or funding advocacy—then follow best practices to de-identify and anonymize them to the greatest extent possible.</p>
<p>When you do collect user information, make sure your users are notified about that information collection and offered the option to affirmatively opt in. Further limit data collection by allowing pseudonymous or anonymous use of library services wherever possible. For example, allow people to use library computers without a personalized login, and don’t require logins on library web services unless it’s necessary to access a user account. Similarly, leave the library Wi-Fi network open, don’t keep logs of IP addresses, and ensure your network deletes connection logs immediately after log-off.</p>
<p>Make sure library operated websites and services aren’t logging user IP addresses, and if so, purge them quickly and regularly. Educate users about any differences between services provided in the library versus those services accessed remotely—for example, services accessed via library computers will only see the library’s IP address, while remotely accessing services can expose a user's own IP address.</p>
<h3>2. Maintain policies and procedures for responding to government requests and for notifying users of requests received</h3>
<p>Communicate with users about how you will respond to requests for their information. Government requests for information may come in a variety of forms, from simple requests without a warrant or court order, to subpoenas, warrants, and NSLs. Policies must clearly dictate how library staff should respond to each of these requests. Make sure your staff knows how to handle requests for user information.</p>
<p>Note that, without a warrant, court order, or NSL, libraries are generally not required to provide user information, and may refuse to comply. While search warrants may be carried out immediately, all government requests for information may be examined by library counsel for legal defects. If you receive a request for patron information you should contact an attorney. EFF stands ready to help libraries sort through their options when they receive suspect legal process.</p>
<p>Policies should also address how and when users will be notified of government requests for information. In response to government requests accompanied by a gag order, some libraries, like the <a href="https://www.eff.org/cases/2016-internet-archive-nsl">Internet Archive</a> and the Library Connection, have fought to lift the gag. Again, EFF stands ready to assist.</p>
<h3>3. Maintain accurate, accessible privacy policies, and notify users when they change</h3>
<p>A library’s privacy policy should, at a minimum, tell users what types of information are collected, how long that information is stored, how it may be used, and who may access it under what conditions. Users should be immediately notified of any changes to library privacy policies, and should have an opportunity to opt in to continued use of affected services.</p>
<p>But the library’s privacy policy alone may not cover all of the catalogs, databases, e-books, checkout systems, and other third-party services a user may encounter in the library. At a minimum, users should be alerted when they are interacting with a third-party vendor, and should be notified of those vendors’ privacy policies. Libraries should also allow users the opportunity to affirmatively opt in to services that do not allow the same privacy protections as the library—or, even better, wherever possible libraries should require third-party vendors to match their privacy practices. (See EFF’s <a href="https://www.eff.org/policy">privacy policy</a> as an example.)</p>
<h3>4. Use HTTPS for your whole website at all times, and push your vendors to do the same</h3>
<p>While many libraries already use HTTPS on parts of their websites, this strategy is <a href="https://www.eff.org/deeplinks/2015/05/what-every-librarian-needs-know-about-https">ineffective</a> at securing user information. Use a service like <a href="https://certbot.eff.org/">Certbot</a> to migrate your <em>entire</em> website to HTTPS, and push your third-party vendors—including e-book vendors—to do the same. Without such protections, your users’ information may be at risk in-transit and vulnerable to anyone logged onto the same network.</p>
<p>In addition, you should limit the use of cookies used to track users’ preferences and activities. If your website does use cookies, allow users to affirmatively opt in to accept the cookie. Don’t condition access to your site on acceptance.</p>
<h3>5. Secure library computer browsers</h3>
<p>Unsecure browsers can leak information about what users are doing online—including the searches they run and websites they visit—providing a <a href="http://www.slate.com/articles/technology/future_tense/2016/07/the_fbi_should_need_a_warrant_to_access_your_browser_history.html">detailed picture</a> of their online activity. Library computers should default to browsers with built-in privacy protections, like Mozilla Firefox or Google Chrome. Enable privacy-protective tools and extensions like EFF’s <a href="https://www.eff.org/privacybadger">Privacy Badger</a> and <a href="https://www.eff.org/https-everywhere%20">HTTPS Everywhere</a>, and update both the browsers and extensions whenever an update becomes available.</p>
<h3>6. Require third-party vendors to match library privacy practices for patron data</h3>
<p>As noted above, libraries today use an increasing number of third-party vendors who have access to user data. Libraries must work to ensure that their third-party vendors adopt practices and policies in line with libraries’ own privacy policies. Third-party services can track, collect data about, and analyze user behavior—and that information can in turn be demanded by law enforcement. This can include highly sensitive user information, like name and account identifiers, IP addresses, demographic information, search history, and reading history.</p>
<p>Librarians can also take control of how they use and present third-party services, including configuring default settings in as privacy-protective a manner as possible and conducting regular reviews of privacy practices and options.</p>
<p>In addition, analytical and behavioral profiling services can pose particular risks for users—producing detailed records of users’ identities, reading habits, and behaviors. Avoid allowing these services to access user information without obtaining users' explicit, opt-in consent.</p>
<h3>Looking to libraries</h3>
<p>As the new administration takes office in January, we will need librarians more than ever. We need them to safeguard our access to information and our intellectual privacy. We need them to limit the amount and specificity of data available about users. We need them to fight back against government requests for user information.</p>
<p>And now it’s essential that all librarians go beyond these crucial steps to consider the full range of threats to their users’ privacy, and act to protect that privacy in a changing environment. We applaud libraries for the work they’re already doing, and urge the entire library community to take additional action before it’s too late.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Librarians%2C%20Act%20Now%20to%20Protect%20Your%20Users%20%28Before%20It%E2%80%99s%20Too%20Late%29&amp;url=https%3A//www.eff.org/ar/deeplinks/2016/12/librarians-act-now-protect-your-users-its-too-late&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Librarians%2C%20Act%20Now%20to%20Protect%20Your%20Users%20%28Before%20It%E2%80%99s%20Too%20Late%29&amp;u=https%3A//www.eff.org/ar/deeplinks/2016/12/librarians-act-now-protect-your-users-its-too-late" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2016/12/librarians-act-now-protect-your-users-its-too-late" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Librarians%2C%20Act%20Now%20to%20Protect%20Your%20Users%20%28Before%20It%E2%80%99s%20Too%20Late%29&amp;url=https%3A//www.eff.org/ar/deeplinks/2016/12/librarians-act-now-protect-your-users-its-too-late" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Mon, 05 Dec 2016 15:46:33 +0000Gennie Gebhart and Kerry Sheehan94050 at https://www.eff.orgNational Security LettersPrivacyFree SpeechInternet Archive Received National Security Letter with FBI Misinformation about Challenging Gag Orderhttps://www.eff.org/ar/press/releases/internet-archive-received-national-security-letter-fbi-misinformation-about
<div class="field field-name-field-pr-subhead field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Potentially Thousands of Communication Providers Received Bad Instructions for Fighting Secrecy Provisions</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>The <a href="http://blog.archive.org/2016/11/28/the-archive-receives-new-nsl-from-fbi">Internet Archive</a> <a href="https://www.eff.org/document/national-security-letter-sent-internet-archive">published</a> a formerly secret national security letter (NSL) today that includes misinformation about how to contest the accompanying gag order that demanded total secrecy about the request. As a result of the Archive’s challenge to the letter, the FBI has agreed to send clarifications about the law to potentially thousands of communications providers who have received NSLs in the last year and a half.</p>
<p>The NSL issued to the Archive said the library had the right to “make an annual challenge to the nondisclosure requirement.” But in 2015, Congress updated the law to allow for more than one request a year, so that communications providers could speak out about their experience without unneeded delay. Represented by the Electronic Frontier Foundation (EFF), the Archive <a href="https://www.eff.org/document/archives-response-nsl">informed</a> the FBI that it did not have the information the agency was seeking and pointed out the legal error. The FBI agreed to drop the gag order in this case and allow the publication of the NSL.</p>
<p>“The free flow of information is at the heart of the Internet Archive’s work, but by using national security letters in conjunction with unconstitutional gag orders, the FBI is trying to keep us all in the dark,” said Brewster Kahle, founder and digital librarian of the Internet Archive. “Here, it’s even worse: that secrecy helped conceal that the FBI was giving all NSL recipients bad information about their rights. So we especially wanted to make this NSL public to give libraries and other institutions more information and help them protect their users from any improper FBI requests.”</p>
<p>The Archive received this NSL in August, more than a year after Congress changed the law to allow more gag order challenges. In its <a href="https://www.eff.org/document/government-withdrawal-nsl">letter</a> removing the gag order, the FBI acknowledged that it issued other NSLs that included the error, and stated that it will inform all recipients about the mistake. Given that the FBI has said that it issued about 13,000 NSLs last year, thousands of communications providers likely received the false information, and potentially delayed petitioning the court for the right to go public.</p>
<p>“The opaque NSL process—including the lack of oversight by a court—makes it very vulnerable to errors of law. Add to that the routine use of gags and enforced secrecy, and those errors become difficult to find and correct,” said EFF Staff Attorney Andrew Crocker. “We are grateful to the Internet Archive for standing up to the FBI and shining some light on this error. We hope that others who receive the correction will also step forward to have their gags lifted and shine more light on these unconstitutional data collection tools.”</p>
<p>This is the second NSL that the Internet Archive has published after battling with the FBI. In 2007, the Archive <a href="https://www.eff.org/press/archives/2008/05/06">received an NSL </a>that exceeded the FBI’s authority to issue demands to libraries. With help from EFF and the American Civil Liberties Union (ACLU), the FBI withdrew the letter and agreed to let the Archive go public in May of 2008.</p>
<p>But many gag orders are still in place. Yesterday, <a href="https://www.eff.org/press/releases/credo-confirms-its-center-long-running-NSL-fight">CREDO Mobile confirmed</a> it was at the center of EFF's long-running fight against NSLs after a three-year-old gag order was finally revoked. Along with CREDO's case, EFF is litigating <a href="https://www.eff.org/press/releases/briefing-unsealed-court-battle-over-national-security-letters">two other challenges</a> to NSL gag orders on behalf of communications providers who are still gagged.</p>
<p>For the national security letter published by the Internet Archive:<br /><a href="https://www.eff.org/document/national-security-letter-sent-internet-archive">https://www.eff.org/document/national-security-letter-sent-internet-archive</a></p>
<p>For more on the fight against NSLs:<br /><a href="https://www.eff.org/deeplinks/2016/12/fighting-nsl-gag-orders-help-our-friends-credo-and-internet-archive">https://www.eff.org/deeplinks/2016/12/fighting-nsl-gag-orders-help-our-friends-credo-and-internet-archive</a></p>
</div></div></div><div class="field field-name-field-contact field-type-node-reference field-label-above"><div class="field-label">Contact:&nbsp;</div><div class="field-items"><div class="field-item even"><div class="ds-1col node node-profile view-mode-node_embed clearfix">
<div class="">
<div class="field field-name-field-profile-first-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Andrew</div></div></div><div class="field field-name-field-profile-last-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Crocker</div></div></div><div class="field field-name-field-profile-title field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Staff Attorney</div></div></div><div class="field field-name-field-profile-email field-type-email field-label-hidden"><div class="field-items"><div class="field-item even"><a href="mailto:andrew@eff.org">andrew@eff.org</a></div></div></div> </div>
</div>
</div><div class="field-item odd"><div class="ds-1col node node-profile view-mode-node_embed clearfix">
<div class="">
<div class="field field-name-field-profile-first-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Internet</div></div></div><div class="field field-name-field-profile-last-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Archive</div></div></div><div class="field field-name-field-profile-email field-type-email field-label-hidden"><div class="field-items"><div class="field-item even"><a href="mailto:info@archive.org">info@archive.org</a></div></div></div> </div>
</div>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Internet%20Archive%20Received%20National%20Security%20Letter%20with%20FBI%20Misinformation%20about%20Challenging%20Gag%20Order&amp;url=https%3A//www.eff.org/ar/press/releases/internet-archive-received-national-security-letter-fbi-misinformation-about&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Internet%20Archive%20Received%20National%20Security%20Letter%20with%20FBI%20Misinformation%20about%20Challenging%20Gag%20Order&amp;u=https%3A//www.eff.org/ar/press/releases/internet-archive-received-national-security-letter-fbi-misinformation-about" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/press/releases/internet-archive-received-national-security-letter-fbi-misinformation-about" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Internet%20Archive%20Received%20National%20Security%20Letter%20with%20FBI%20Misinformation%20about%20Challenging%20Gag%20Order&amp;url=https%3A//www.eff.org/ar/press/releases/internet-archive-received-national-security-letter-fbi-misinformation-about" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 01 Dec 2016 20:09:13 +0000Rebecca Jeschke93953 at https://www.eff.orgCREDO Confirms It’s at Center of Long-Running Legal Fight Over NSLshttps://www.eff.org/ar/press/releases/credo-confirms-its-center-long-running-NSL-fight
<div class="field field-name-field-pr-subhead field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Mobile Provider Battled Gag Order That Forced It to Keep Customers in the Dark </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>San Francisco - CREDO Mobile representatives confirmed today that their company was at the center of the long-running legal battle over the constitutionality of national security letters (NSLs), and published the letters the government sent three years ago.</p>
<p>The Electronic Frontier Foundation (EFF) has represented CREDO in this matter since 2013—and the case, bundled with two other NSL challenges, has reached the United States Court of Appeals for the Ninth Circuit. Until now, CREDO was under a gag order, preventing CREDO officials from identifying the company or discussing their role in the case. In March, a district court <a href="https://www.eff.org/press/releases/ruling-unsealed-national-security-letters-upheld-constitutional">found</a> that the FBI had failed to demonstrate the need for this gag, and struck it down pending an appeal by the government. But earlier this month, the government decided to drop its appeal of that order, leaving CREDO free to talk about why the legal challenge is important to the company and its customers.</p>
<p>“A founding principle of CREDO is to fight for progressive causes we believe in, and we believe that NSLs are unconstitutional. These letters, and the gag orders that came with them, infringed our free speech rights, blocking us from talking to our members about them or discussing our experience while lawmakers debated NSL reform,” said Ray Morris, CREDO CEO. “We were proud to fight these NSLs all these years, and now we are proud to publish the letters and take full part in the ensuing debate.”</p>
<p>The NSLs statutes have been highly controversial since their use was expanded dramatically by the PATRIOT Act in 2001. Soon after that, internal reviews by the Department of Justice found that they had been widely misused. With an NSL, the FBI—on its own, and without court approval—can issue a secret letter to a communications provider, demanding information about its customers, nearly always accompanied by a gag order. That prevents recipients from notifying users about the NSL or even discussing the letter at all.</p>
<p>While the government has stopped pursuing the NSL gag orders on CREDO in this case, EFF’s two other NSL challenges are still being litigated in the appeals court. EFF’s clients—who still must remain secret—argue that they are being unconstitutionally barred from discussion and debate about government use of NSLs and surveillance reform.</p>
<p>“The FBI issues NSL demands for customer information without a warrant or any court supervision, and slaps on a gag order to make it hard for anyone to complain,” said EFF Staff Attorney Andrew Crocker. “The years-long fight in this case demonstrates the difficulty of challenging these orders, and we’re grateful to CREDO for stepping up for its customers and the public to fight these NSLs.”</p>
<p>CREDO Mobile has been in business for 31 years, originally as Working Assets. CREDO believes in bringing social change through every day acts of commerce. Since its founding, it’s donated $81 million to progressive causes.</p>
<p>For the NSLs to CREDO:<br /><a href="https://www.eff.org/document/redacted-national-security-letter-1">https://www.eff.org/document/redacted-national-security-letter-1</a><br /><a href="https://www.eff.org/document/redacted-national-security-letter-2">https://www.eff.org/document/redacted-national-security-letter-2</a></p>
<p>For more on this case:<br /><a href="https://www.eff.org/cases/re-national-security-letter-2013-13-80089">https://www.eff.org/cases/re-national-security-letter-2013-13-80089</a></p>
</div></div></div><div class="field field-name-field-contact field-type-node-reference field-label-above"><div class="field-label">Contact:&nbsp;</div><div class="field-items"><div class="field-item even"><div class="ds-1col node node-profile view-mode-node_embed clearfix">
<div class="">
<div class="field field-name-field-profile-first-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Andrew</div></div></div><div class="field field-name-field-profile-last-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Crocker</div></div></div><div class="field field-name-field-profile-title field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Staff Attorney</div></div></div><div class="field field-name-field-profile-email field-type-email field-label-hidden"><div class="field-items"><div class="field-item even"><a href="mailto:andrew@eff.org">andrew@eff.org</a></div></div></div> </div>
</div>
</div><div class="field-item odd"><div class="ds-1col node node-profile view-mode-node_embed clearfix">
<div class="">
<div class="field field-name-field-profile-first-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">CREDO</div></div></div><div class="field field-name-field-profile-last-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Mobile</div></div></div><div class="field field-name-field-profile-email field-type-email field-label-hidden"><div class="field-items"><div class="field-item even"><a href="mailto:press@credoaction.com">press@credoaction.com</a></div></div></div> </div>
</div>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=CREDO%20Confirms%20It%E2%80%99s%20at%20Center%20of%20Long-Running%20Legal%20Fight%20Over%20NSLs&amp;url=https%3A//www.eff.org/ar/press/releases/credo-confirms-its-center-long-running-NSL-fight&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=CREDO%20Confirms%20It%E2%80%99s%20at%20Center%20of%20Long-Running%20Legal%20Fight%20Over%20NSLs&amp;u=https%3A//www.eff.org/ar/press/releases/credo-confirms-its-center-long-running-NSL-fight" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/press/releases/credo-confirms-its-center-long-running-NSL-fight" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=CREDO%20Confirms%20It%E2%80%99s%20at%20Center%20of%20Long-Running%20Legal%20Fight%20Over%20NSLs&amp;url=https%3A//www.eff.org/ar/press/releases/credo-confirms-its-center-long-running-NSL-fight" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 30 Nov 2016 21:12:20 +0000Rebecca Jeschke93982 at https://www.eff.orgDebunking the Patriot Act as It Turns 15https://www.eff.org/ar/deeplinks/2016/10/debunking-patriot-act-it-turns-15
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><img src="/files/2016/10/26/og-patriotact.jpg" alt="" height="325" width="650" /></p>
<p>The Patriot Act turns 15 today, but that’s nothing to celebrate.</p>
<p>Since President George W. Bush signed this bill into law on October 26, 2001, the Patriot Act has been ardently defended by its supporters in the intelligence community and harshly criticized by members of Congress, the tech industry, and privacy advocates like us. Despite the debates that have unfolded over the last 15 years, including last year’s reforms through the USA FREEDOM Act, there’s still a lot to learn about this controversial law.</p>
<p>Introduced in the wake of the terrorist attacks on September 11, 2001, the Patriot Act opened up new justifications and methods for U.S. surveillance. In recent years, the debate around the law has focused on the sweeping phone records surveillance exposed by former NSA contractor Edward Snowden in 2013, but there are many aspects to the statute and how it came to be that are unfamiliar to many.</p>
<p>In honor of the law’s 15th anniversary, here are 15 things you might not know about the Patriot Act.</p>
<ol><li><strong>Congress did not give the Patriot Act the time or debate it deserved</strong> – Only 45 days passed between the Sept. 11, 2001 attacks and the day Bush signed the Patriot Act into law. “No one has really had an opportunity to look at the bill to see what is in it,” Rep. Bobby Scott <a href="https://sunlightfoundation.com/blog/2009/03/02/congress-had-no-time-to-read-the-usa-patriot-act/">said</a> at the time. The 363-page bill was considered on the House floor the same day it was introduced, leapfrogging over deliberation in the committees with jurisdiction. It passed the Senate the next day and was signed into law the following day. That expedited timeline gave members of Congress<span>—f</span>earful of looking un-American in the wake of national tragedy<span>—</span>little time to read, understand, and debate what they were voting on.</li>
<li><strong>The Patriot Act isn’t just about fighting terrorism</strong> – While it was discussed largely in the context of fighting terrorism, some of the tools that came out of the law are almost exclusively used in cases that have nothing to do with terrorism. For instance, the so-called <a href="https://www.good.is/articles/the-most-important-chart-about-the-patriot-act-you-ll-see?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A%20good%2Flbvp%20%28GOOD%20Main%20RSS%20Feed%29">sneak-and-peek search warrants</a> standardized in the law are used overwhelmingly in domestic drug investigations. Those Delayed Notice warrants allow law enforcement to secretly enter and search private premises.</li>
<li><strong>The U.S. government collected Americans’ phone records in bulk long before using the Patriot Act for justification</strong> – The NSA’s sweeping phone record collection surveillance program under Section 215 of the Patriot Act was hardly the first time the U.S. collected American phone records. For decades, the Drug Enforcement Administration <a href="http://www.usatoday.com/story/news/2015/04/07/dea-bulk-telephone-surveillance-operation/70808616/">tracked</a> Americans’ international phone calls under a wholly unrelated provision of law. Even the NSA’s phone record program <a href="http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm">existed</a> for years before the Bush administration first <a href="https://projects.propublica.org/graphics/surveillance-timeline">sought approval</a> in 2006 from the Foreign Intelligence Surveillance Court to use Section 215 to justify that program.</li>
<li><strong>Surveillance under the Patriot Act goes far beyond your phone company</strong> – Section 215 dramatically expanded the “business records” provision of the Foreign Intelligence Surveillance Act. Although it was most notoriously used for the NSA’s call record program and was reformed by the USA FREEDOM Act, despite those reforms, the provision still allows the FBI to obtain records from any type of business, including your car rental company, your school, or your employer.</li>
<li><strong>You don’t need to be suspected of committing a crime to be spied on under some provisions of the Patriot Act</strong> – Under some provisions of the Patriot Act, all the FBI needs to show is that the surveillance is “relevant” to its investigation<span>—</span>a term we know the FBI has interpreted <a href="https://www.eff.org/deeplinks/2015/05/eff-case-analysis-appeals-court-rules-nsa-phone-records-dragnet-illegal">extremely broadly</a> in the past. Although USA FREEDOM Act’s changes to the law may rein in future abuses of the statute, we still don’t have the full story about how the law has been used previously.</li>
<li><strong>In practice, the law’s National Security Letters (NSLs) are not the precise, fine-toothed tools they’re made out to be</strong> – Patriot Act defenders say the often-secret NSLs<span>—</span>the uses of which were expanded in the law<span>—</span>are used in a tailored way to get the communications of specific individuals who are tied to national security investigations. But in practice, the law is stretched by the FBI, a problem that is compounded by the excessive secrecy the FBI imposes on recipients. For instance, the FBI in 2003 <a href="http://www.washingtonpost.com/wp-dyn/content/article/2005/11/05/AR2005110501366.html">reportedly</a> used NSLs and subpoenas to collect information from airlines and casino operators about the almost 300,000 people in Las Vegas for New Years that year.</li>
<li><strong>Parts of the Patriot Act have been ruled unconstitutional</strong> – The Patriot Act dramatically expanded the FBI’s authority to issue NSLs, and federal courts have struck down these provisions as unconstitutional on several occasions. The most recent of these rulings came in 2013 after a <a href="https://www.eff.org/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute">lawsuit</a> from EFF. In that ruling, Judge Susan Illston said the mandated secrecy around the NSLs violates the First Amendment.</li>
<li><strong>Despite reforms, the fight over NSLs is ongoing</strong> – In response to EFF’s landmark victory, Congress amended the NSL statute yet again as part of the 2015 USA FREEDOM Act. However, many of the controversial NSL provisions from the Patriot Act remain in place, and the FBI continues to issue thousands of NSLs every year. In 2016, a court <a href="https://www.eff.org/deeplinks/2016/04/disappointing-ruling-national-security-letters-not-last-word">upheld</a> this new version of the statute, but EFF appealed, and the fight is currently ongoing in the Ninth Circuit.</li>
<li><strong>The Patriot Act added a huge swath of people to the FBI’s DNA database</strong> – <a href="https://www.cga.ct.gov/2003/olrdata/jud/rpt/2003-R-0411.htm">Section 503</a> of the law made it so that the DNA of anyone convicted of a violent crime<span>—</span>including assault, threatening violence or burglary<span>—</span>is entered into the DNA database that the FBI uses in terrorism investigations.</li>
<li><strong>The Patriot Act expanded the power of the government to use wiretaps to go after computer crimes</strong> – One provision in the law, <a href="https://apps.americanbar.org/natsecurity/patriotdebates/act-section-202">Section 202</a>, gave law enforcement the authority to get wiretaps for investigations into violations of the Computer Fraud and Abuse Act, the vague federal anti-hacking law that prosecutors often use to escalate charges and penalties.</li>
<li><strong>The law’s “critical” <a href="https://apps.americanbar.org/natsecurity/patriotdebates/lone-wolf">lone wolf provision</a> isn’t as critical as officials would like you to believe</strong> – In calling for the reauthorization of the three Patriot Act authorities that temporarily expired in 2015, U.S. officials called those provisions critical for protecting national security. But intelligence officials admitted in 2015 that one of the three authorities<span>—</span>the “lone wolf” provision<span>—</span>has never actually been used. The provision authorizes the government to spy on someone who they suspect is involved with terrorist activities but does not have known ties to terrorist groups.</li>
<li><strong>The USA FREEDOM Act didn’t “fix” the Patriot Act</strong> – The U.S. government moved in the <a href="https://www.eff.org/deeplinks/2015/04/new-usa-freedom-act-step-right-direction-more-must-be-done">right direction</a> when Congress passed and Obama signed into law the USA FREEDOM Act in 2015. That bill took some positive steps towards reining in the controversial phone data surveillance program under Section 215 of the Patriot Act, but it left most of the existing law untouched, including other authorities that raise privacy concerns.</li>
<li><strong>Even after the USA FREEDOM Act, the NSA casts a wide net when looking for Americans’ phone records</strong> – The U.S. government made a series of changes to its phone records program in response to outrage after Snowden’s leaks in 2013, including having the phone companies, rather than the government, store the records and limiting how wide a net the government can cast when looking for phone records. But they didn’t narrow it enough when they limited their searches to <a href="https://www.aclu.org/blog/are-two-hops-too-many">two degrees of separation</a>, which still sweeps in a huge number of people. If you and a suspected terrorist order pizza from the same pizza delivery place<span>—</span>or, more invasively, see the same mental health professional<span>—</span>the NSA can see how often and when you call.</li>
<li><strong>The Patriot Act is just the tip of the iceberg when it comes to troubling, privacy-invasive government surveillance authorities</strong> – Although the Patriot Act, along with the Foreign Intelligence Surveillance Act, have been at the center of recent years’ debates over government surveillance and privacy concerns, the law is only one of many things the government cites when justifying its surveillance. Also in the intelligence community’s toolbox are <a href="https://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html?utm_term=.12d885d55791">Executive Order 12333</a><span>—</span>issued by President Ronald Reagan in 1981<span>—</span>and the <a href="https://www.aclu.org/blog/cisa-isnt-about-cybersecurity-its-about-surveillance">Cybersecurity Information Security Sharing Act</a> passed by Congress in 2015.</li>
<li><strong>The law has built-in reset buttons to ensure that we keep talking about these expansive surveillance powers</strong> – Congress included language in the Patriot Act to ensure that lawmakers would have to reconsider the law every few years. USA FREEDOM passed in 2015 as parts of the law were expiring. The next sunset will be at the end of 2019, giving lawmakers, civil liberties groups and privacy-minded Americans another shot to rein in widespread government surveillance.</li>
</ol><p>EFF has been fighting against abuses of the Patriot Act since it first passed, and we’ll continue fighting in the courts and on the Hill. To help us in those fights, <a href="https://supporters.eff.org/donate/pab">donate to EFF today</a>.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Debunking%20the%20Patriot%20Act%20as%20It%20Turns%2015&amp;url=https%3A//www.eff.org/ar/deeplinks/2016/10/debunking-patriot-act-it-turns-15&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Debunking%20the%20Patriot%20Act%20as%20It%20Turns%2015&amp;u=https%3A//www.eff.org/ar/deeplinks/2016/10/debunking-patriot-act-it-turns-15" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2016/10/debunking-patriot-act-it-turns-15" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Debunking%20the%20Patriot%20Act%20as%20It%20Turns%2015&amp;url=https%3A//www.eff.org/ar/deeplinks/2016/10/debunking-patriot-act-it-turns-15" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 26 Oct 2016 18:17:40 +0000Kate Tummarello93626 at https://www.eff.orgCommentaryPATRIOT ActPrivacyNational Security LettersBriefing Unsealed in Court Battle Over National Security Lettershttps://www.eff.org/ar/press/releases/briefing-unsealed-court-battle-over-national-security-letters
<div class="field field-name-field-pr-subhead field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">EFF Argues that NSL Secrecy Violates First Amendment and Chills Debate on Government Surveillance</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>San Francisco - An appeals court published redacted briefing by the Electronic Frontier Foundation (EFF) today arguing that national security letters (NSLs) and their accompanying gag orders violate the free speech rights of companies who want to keep their users informed about government surveillance.</p>
<p>EFF represents two service providers in challenging the NSL statutes in front of the United States Court of Appeals for the Ninth Circuit. Most of the proceedings have been sealed since the case began five years ago, but some redacted documents have been released after government approval.</p>
<p>“Just this week we’ve seen Open Whisper Systems—the company behind the Signal messaging service—successfully fight a government gag order attached to a subpoena for customer information. Meanwhile, Yahoo is facing criticism for allowing the government wide-ranging access to its users’ communications,” said EFF Staff Attorney Andrew Crocker. “Our clients want to join this conversation, using their own experiences as a basis to talk about what kind of government surveillance is appropriate and what reform is needed—but NSL gags prevent them from doing so. We’re asking the court to strike down this unconstitutional statute so we can have the robust and inclusive debate that this issue deserves.”</p>
<p>The NSL statutes have been highly controversial since their use was expanded under the USA PATRIOT Act. With an NSL, the FBI—on its own, and without court approval—can issue a secret letter to a communications provider, demanding information about its customers. In this case and nearly all others, the NSL is issued in conjunction with a gag order, preventing the companies from notifying users of the demand or discussing the letter at all. Congress changed some parts of the statute in 2015, but retained the basic elements of the gags. In fact, EFF’s clients still cannot identify themselves publicly or share their experiences as part of the debate over government surveillance of technology services.</p>
<p>“Our clients want to be able to issue accurate transparency reports and talk to their customers about how they try to defend users from overreaching government investigations,” Crocker said. “But instead, the FBI instituted indefinite gag orders to shield its demands for information. This is an unconstitutional restriction of our clients’ First Amendment rights.”</p>
<p>For the full redacted brief:<br /><a href="https://www.eff.org/document/16-16067-opening-brief-redacted">https://www.eff.org/document/16-16067-opening-brief-redacted</a></p>
<p>For more on national security letters:<br /><a href="https://www.eff.org/issues/national-security-letters">https://www.eff.org/issues/national-security-letters</a></p>
</div></div></div><div class="field field-name-field-contact field-type-node-reference field-label-above"><div class="field-label">Contact:&nbsp;</div><div class="field-items"><div class="field-item even"><div class="ds-1col node node-profile view-mode-node_embed clearfix">
<div class="">
<div class="field field-name-field-profile-first-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Andrew</div></div></div><div class="field field-name-field-profile-last-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Crocker</div></div></div><div class="field field-name-field-profile-title field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Staff Attorney</div></div></div><div class="field field-name-field-profile-email field-type-email field-label-hidden"><div class="field-items"><div class="field-item even"><a href="mailto:andrew@eff.org">andrew@eff.org</a></div></div></div> </div>
</div>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Briefing%20Unsealed%20in%20Court%20Battle%20Over%20National%20Security%20Letters&amp;url=https%3A//www.eff.org/ar/press/releases/briefing-unsealed-court-battle-over-national-security-letters&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Briefing%20Unsealed%20in%20Court%20Battle%20Over%20National%20Security%20Letters&amp;u=https%3A//www.eff.org/ar/press/releases/briefing-unsealed-court-battle-over-national-security-letters" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/press/releases/briefing-unsealed-court-battle-over-national-security-letters" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Briefing%20Unsealed%20in%20Court%20Battle%20Over%20National%20Security%20Letters&amp;url=https%3A//www.eff.org/ar/press/releases/briefing-unsealed-court-battle-over-national-security-letters" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 07 Oct 2016 19:36:52 +0000Rebecca Jeschke93456 at https://www.eff.orgCanary Watch – One Year Laterhttps://www.eff.org/ar/deeplinks/2016/05/canary-watch-one-year-later
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p class="western">We announced <a href="https://canarywatch.org/">Canary Watch</a> a year ago as a coalition project <a href="https://canarywatch.org/faq.html">to list Warrant Canaries</a> and monitor them for changes or removal. Canary Watch was a joint project, with EFF, Freedom of the Press Foundation, NYU Law, Calyx and the Berkman Center.</p>
<p class="western"><img src="/files/styles/medium/public/2016/05/23/canary-logo.png?itok=KWRkKWHM" width="220" height="220" alt="Canary Watch Logo" class="image-medium image-left" />Along the way, the project has been part of the massive popularization of the concept: we began with just eleven canaries listed, and now just a year later we have almost seventy. In the course of tracking those, we have learned many lessons about the different types of canaries that are present on the web, as well as what happens when a canary goes away.</p>
<p class="western">In that way, the Canary Watch project has been a major success, and we’ve decided that it has achieved the goals we set out for it. As of today we will no longer accept submissions of new canaries or monitor the existing canaries for changes or take downs.</p>
<p class="western">Transparency reports and warrant canaries have an important role to play in the fight against illegal and unconstitutional national security process, including National Security Letters and other secret court processes. We have not received any court orders or government requests to shut down the Canary Watch project. Rather, all of the members of the Canary Watch coalition have come to the agreement that the project has run its course and has come to a natural ending point.</p>
<p class="western">Over the course of the project, we have learned some things about the nature of canaries on the Web which are important for anyone working with warrant canaries or doing activism around them.</p>
<h2 class="western">The Number of Warrant Canaries Is Increasing</h2>
<p class="western">We started with eleven canaries; within four months that number grew to fifty; at the end of the project there were almost seventy warrant canaries in the Canary Watch database, with requests to add dozens more. In the last month the number of searches for warrant canaries grew by an order of magnitude. This is likely thanks in large part to the disappearance of reddit's warrant canary from their 2016 transparency report. The last year has, without a doubt, been a banner year for awareness of warrant canaries.</p>
<p class="western">
</p><p></p><div class="caption caption-center"><div class="caption-inner"><img src="/files/2016/05/23/warrantcanaryinterest.png" width="689" height="282" alt="Search frequency for the term “Warrant canary” since 2007" title="Search frequency for the term “Warrant canary” since 2007" />Search frequency for the term “Warrant canary” since 2007</div></div>
<h2 class="western">Warrant Canaries Provide Interesting, But Not Definitive Information</h2>
<p class="western">Since July of 2013 Pinterest has been publishing a warrant canary which simply read "National Security: 0" as a part of their quarterly <a href="https://help.pinterest.com/en/articles/transparency-report">transparency report</a>. In 2015, Pinterest's number of national security requests changed from 0 to 0-249, reported for January to June, and July to December (instead of quarterly). What prompted this move? Under <a href="https://www.law.cornell.edu/uscode/text/50/1874">the law</a>, a company that has received a national security request can report in bands of 250, starting at 0, semiannually. Thus, there is certainly the strong implication that Pinterest did receive a national security request, because it would have otherwise have continued to report 0.</p>
<p class="western">Yet, in our time working with Canary Watch we have seen many canaries go away and come back, fail to be updated, or disappear altogether along with the website that was hosting it. Until the gag orders accompanying national security requests are struck down as unconstitutional, there is no way to know for certain whether a canary change is a true indicator. Instead the reader is forced to rely on speculation and circumstantial evidence to decide what the meaning of a missing or changed canary is.</p>
<p class="western"></p>
<p></p>
<h2 class="western">Warrant Canaries Can Be Fickle</h2>
<p class="western">We also observed warrant canaries behaving in unexpected ways. Sometimes a canary would have subtle changes in language or grammar, which can be hard to interpret. Other canaries would regularly change what URL they were located at, and for others domains these URL changes were sudden and unexpected. Canaries often were not updated at all, or were updated several days or weeks late. Sometimes the warrant canary, along with the entire website would disappear without explanation or reason, and sometimes just the warrant canary would disappear and come back later, unchanged. All of this uncertainty caused numerous false alarms, which made it difficult to monitor warrant canaries. Additionally, this chaos served as a further demonstration of how difficult it is to interpret what it means when a warrant canary changes.</p>
<h2 class="western">Warrant Canaries Come In Many Shapes and Sizes</h2>
<p class="western">One of the most surprising things that we have learned over the course of the Canary Watch project is that almost every canary is unique. We have seen canaries that were in PDFs, plaintext, HTML, and even images. We have seen canaries that were integrated into the website banner and canaries which were only available on Github. We have seen canaries that are signed using GPG, canaries that are part of a transparency report, canaries that include the day's weather and top news headlines. We have seen canaries that are updated on a daily basis and canaries which are updated once per year. We have seen canaries that were created once and then never updated again. Again, the fact that canaries are non-standard makes it difficult to automatically monitor them for changes or takedowns.</p>
<p class="western">The major strides in our understanding about the nature and current status of warrant canaries and national security letters mean Canary Watch has definitely been a success. Moreover, it raised awareness and contributed to an important policy debate that is now well underway. In contrast to the uncertainty a year ago, it now seems that the Internet at large can offer robust and decentralized monitoring of warrant canaries; the rapid spread of the news when reddit’s canary disappeared is a testament to that fact.</p>
<p class="western">Finally we would like to give a huge thank you to our coalition partners on this project for the last year: The Calyx Institute, Freedom of the Press Foundation, The Berkman Center, and the NYU School of Law.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Canary%20Watch%20%E2%80%93%20One%20Year%20Later&amp;url=https%3A//www.eff.org/ar/deeplinks/2016/05/canary-watch-one-year-later&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Canary%20Watch%20%E2%80%93%20One%20Year%20Later&amp;u=https%3A//www.eff.org/ar/deeplinks/2016/05/canary-watch-one-year-later" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2016/05/canary-watch-one-year-later" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Canary%20Watch%20%E2%80%93%20One%20Year%20Later&amp;url=https%3A//www.eff.org/ar/deeplinks/2016/05/canary-watch-one-year-later" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 25 May 2016 21:58:59 +0000Cooper Quintin91770 at https://www.eff.orgAnnouncementNational Security LettersRuling Unsealed: National Security Letters Upheld As Constitutionalhttps://www.eff.org/ar/press/releases/ruling-unsealed-national-security-letters-upheld-constitutional
<div class="field field-name-field-pr-subhead field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">EFF Will Appeal to Protect First Amendment Rights</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>San Francisco - A federal judge has <a href="/document/redacted-order">unsealed</a> her ruling that National Security Letter (NSL) provisions in federal law—as amended by the USA FREEDOM Act—don’t violate the Constitution. The ruling allows the FBI to continue to issue the letters with accompanying gag orders that silence anyone from disclosing they have received an NSL, often for years. The Electronic Frontier Foundation (EFF) represents two service providers in challenging the <a href="/issues/national-security-letters">NSL</a> statutes, who will appeal this decision to the United States Court of Appeals for the Ninth Circuit.</p>
<p>“Our heroic clients want to talk about the NSLs they received from the government, but they’ve been gagged—one of them since 2011,” said EFF Deputy Executive Director Kurt Opsahl. “This government silencing means the service providers cannot issue open and honest transparency reports and can’t share their experiences as part of the ongoing public debate over NSLs and their potential for abuse. Despite this setback, we will take this fight to the appeals court, again, to combat USA FREEDOM’s unconstitutional NSL provisions.”</p>
<p>This long-running battle started in 2011, after one of EFF’s clients challenged an NSL and the gag order it received. In 2013, U.S. District Court Judge Susan Illston issued a <a href="/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules">groundbreaking decision</a>, ruling that the NSL power was unconstitutional. However, the government appealed, and the Ninth Circuit found that changes made by the USA FREEDOM Act passed by Congress last year required a new review by the District Court.</p>
<p>In the decision unsealed this week, the District Court found that the USA FREEDOM Act sufficiently addressed the facial constitutional problems with the NSL law. However, she also ruled that the FBI had failed to provide a sufficient justification for one of our client’s challenges to the NSLs. After reviewing the government’s justification, the court found no “reasonable likelihood that disclosure … would result in danger to the national security of the United States,” or other asserted dangers, and prohibited the government from enforcing that gag. However, the client still cannot identify itself because the court stayed this portion of the decision pending appeal.</p>
<p>“We are extremely disappointed that the superficial changes in the NSL statutes were determined to be good enough to meet the requirements of the First Amendment,” said EFF Staff Attorney Andrew Crocker. “NSL recipients still can be gagged at the FBI’s say-so, without any procedural protections, time limits or judicial oversight. This is a prior restraint on free speech, and it’s unconstitutional.”</p>
<p>The NSL statutes have been highly controversial since their use was expanded under the USA PATRIOT Act. With an NSL, the FBI—on its own, without any judge’s approval—can issue a secret letter to communications service providers, requiring the service to turn over subscriber and other basic non-content information about their customers. The gag orders that the FBI routinely issues along with an NSL have hampered discussion and debate about the process.</p>
<p>For the full unsealed order:<br /><a href="https://www.eff.org/document/redacted-order">https://www.eff.org/document/redacted-order</a></p>
<p>For more on National Security Letters:<br /><a href="//www.eff.org/issues/national-security-letters"> https://www.eff.org/issues/national-security-letters</a></p>
</div></div></div><div class="field field-name-field-contact field-type-node-reference field-label-above"><div class="field-label">Contact:&nbsp;</div><div class="field-items"><div class="field-item even"><div class="ds-1col node node-profile node-promoted view-mode-node_embed clearfix">
<div class="">
<div class="field field-name-field-profile-first-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Kurt</div></div></div><div class="field field-name-field-profile-last-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Opsahl</div></div></div><div class="field field-name-field-profile-title field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Deputy Executive Director and General Counsel</div></div></div><div class="field field-name-field-profile-email field-type-email field-label-hidden"><div class="field-items"><div class="field-item even"><a href="mailto:kurt@eff.org">kurt@eff.org</a></div></div></div> </div>
</div>
</div><div class="field-item odd"><div class="ds-1col node node-profile view-mode-node_embed clearfix">
<div class="">
<div class="field field-name-field-profile-first-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Andrew</div></div></div><div class="field field-name-field-profile-last-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Crocker</div></div></div><div class="field field-name-field-profile-title field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Staff Attorney</div></div></div><div class="field field-name-field-profile-email field-type-email field-label-hidden"><div class="field-items"><div class="field-item even"><a href="mailto:andrew@eff.org">andrew@eff.org</a></div></div></div> </div>
</div>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Ruling%20Unsealed%3A%20National%20Security%20Letters%20Upheld%20As%20Constitutional&amp;url=https%3A//www.eff.org/ar/press/releases/ruling-unsealed-national-security-letters-upheld-constitutional&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Ruling%20Unsealed%3A%20National%20Security%20Letters%20Upheld%20As%20Constitutional&amp;u=https%3A//www.eff.org/ar/press/releases/ruling-unsealed-national-security-letters-upheld-constitutional" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/press/releases/ruling-unsealed-national-security-letters-upheld-constitutional" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Ruling%20Unsealed%3A%20National%20Security%20Letters%20Upheld%20As%20Constitutional&amp;url=https%3A//www.eff.org/ar/press/releases/ruling-unsealed-national-security-letters-upheld-constitutional" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 21 Apr 2016 16:37:00 +0000Rebecca Jeschke91319 at https://www.eff.orgJustice Delayed: Ninth Circuit Sends EFF’s NSL Cases Back for Consideration Under USA FREEDOMhttps://www.eff.org/ar/deeplinks/2015/08/justice-delayed-ninth-circuit-sends-effs-nsl-cases-back-consideration-under-usa
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p class="MsoNormal">Often overlooked in discussions of the USA FREEDOM Act <a href="https://www.eff.org/deeplinks/2015/05/usa-freedom-act-passes-what-we-celebrate-what-we-mourn-and-where-we-go-here" target="_blank">passed</a> in June are the <a href="https://www.eff.org/deeplinks/2015/06/how-usa-freedom-impacts-ongoing-nsa-litigation">changes made to the National Security Letter (NSL) statute</a>. The law addresses some of the more obvious problems with NSLs but fails, by a long shot, to bring them up to the standard required by the U.S. Constitution. Most critically, USA FREEDOM did not fix the problem of overbroad, potentially eternal gag orders or the fact that the NSL statute relegates the court to little more than a rubber stamp.</p>
<p class="MsoNormal">Sadly, in a <a href="https://www.eff.org/document/9th-circuit-order-remanding-case" target="_blank">ruling</a> made public last week, the U.S. Court of Appeals for the Ninth Circuit in San Francisco used these minimal USA FREEDOM Act changes as cause for another delay in considering the constitutionality of NSLs in two of EFF’s <a href="https://www.eff.org/issues/national-security-letters">flagship cases</a>.</p>
<p class="MsoNormal">The result is that the gag orders, which have already muzzled our clients for several years, will continue into the foreseeable future. The gags have prevented our clients from participating fully in the debate around USA FREEDOM and will continue to prevent them from participating in the ongoing public debate about national security surveillance in general and NSLs in particular with the power and authority that comes from speaking as a recipient. </p>
<p class="MsoNormal">While we’re extremely disappointed, we will continue to push forward to get the gags lifted, allow our heroic clients to speak freely, and seek to have the NSL statute declared unconstitutional. </p>
<p class="MsoNormal"><b>What are NSLs and How Did USA FREEDOM (Not) Change Them?</b></p>
<p class="MsoNormal">The NSL statutes allow the government, based only on the FBI’s authority, to <a href="https://www.eff.org/issues/national-security-letters/faq">issue a secret letter to communications service providers</a>, including telephone and Internet services. The letter requires providers to turn over subscriber and other basic non-content information about their customers. No judge is involved.</p>
<p class="MsoNormal">If that weren’t bad enough, NSLs also allow the government to place a gag on the recipient providers, preventing them from telling their affected customers about the request, but also preventing them from telling the public that they’ve even received a letter. This prior restraint violates the First Amendment.</p>
<p class="MsoNormal"><b>EFF’s Heroic, Unnamed Clients</b></p>
<p class="MsoNormal">EFF currently <a href="https://www.eff.org/press/releases/media-alert-oral-arguments-effs-national-security-letter-case">represents two service providers</a> in First Amendment challenges to the statutes, which raise questions of the substance of the laws and also the incredibly overbroad gag provisions. One of our clients has now been gagged since 2011—over 4 years—from discussing even the fact that it received a letter; the other has been gagged for over 2 years.</p>
<p class="MsoNormal">EFF scored <a href="https://www.eff.org/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules">a groundbreaking victory</a> against the unconstitutional NSLs in 2013. A federal district court here in San Francisco held that the NSL statutes were unconstitutional on several grounds, chiefly that they violate the First Amendment. The injunction was stayed pending appeal, and it seemed that the decision stood a good chance of being upheld after the appellate argument in October 2014 (<a href="http://www.ca9.uscourts.gov/media/view.php?pk_id=0000013407">audio</a>).</p>
<p class="MsoNormal">But then the executive branch asked Congress to include some superficial changes in USA FREEDOM. These changes basically codify parts of a procedure the FBI was already using after a previous ruling in New York, while not bringing its actual practices to the level required by the First Amendment.</p>
<p class="MsoNormal"><b>What Didn’t USA FREEDOM Do</b></p>
<p class="MsoNormal">USA FREEDOM did very little to the core of these statutes. As we <a href="https://www.eff.org/document/under-seals-supplemental-brief-re-usa-freedom-act">argued to the Ninth Circuit</a> after USA FREEDOM passed, the law still:</p>
<p class="MsoListParagraphCxSpFirst">· Creates a <i>prior restraint</i> on our clients that doesn’t follow the procedural protections created by the seminal Supreme Court case <a href="https://scholar.google.com/scholar_case?case=5133094020488688451&amp;q=freedman+v.+maryland&amp;hl=en&amp;as_sdt=2003"><i>Freedman v. Maryland</i></a>. Under <i>Freedman</i>, the First Amendment requires the government to seek prior judicial approval for a gag and requires a “prompt” decision by the court, a standard that has plainly been violated here by the years-long gag on our clients. While the law does require a so-called “reciprocal notice” practice—one that the government had already voluntarily adopted—even that procedure fails to meet constitutional standards. It still doesn’t require the government to seek judicial review first or limit the time frame for review. It also still gives the court very little leeway to review the government’s decision to issue a gag.</p>
<p class="MsoListParagraphCxSpMiddle">· Allows the government to gag recipients based upon the mere assertion that a harm “may result,” a boundless, subjective term rather than a showing that the gag is objectively and definitely “necessary” to prevent a harm.</p>
<p class="MsoListParagraphCxSpMiddle">· Authorizes overbroad, open-ended gags, preventing even a general statement that the recipient has received an NSL. Even under USA Freedom, there is no specific provision causing the gag to expire when any threat has ended, instead punting to the government to create new procedures for review “at appropriate intervals,” a term entirely defined by the government.</p>
<p class="MsoListParagraphCxSpLast">· Still allows the government to self-issue NSLs with no prior judicial review, in violation of the First and Fifth Amendments.</p>
<p class="MsoNormal">Even though EFF <a href="https://www.eff.org/deeplinks/2015/05/usa-freedom-act-passes-what-we-celebrate-what-we-mourn-and-where-we-go-here">was neutral on USA FREEDOM</a>, and even supported earlier versions, we were clear that the law did not do enough to reform the intelligence community. NSLs were one of the ways that the law fell short. Even so, the Ninth Circuit’s decision to delay a final decision in these cases is especially disappointing to us and to our clients. After years of intense litigation, our clients remain under an unconstitutional gag and, in a turn of events only Kafka could love, they were unable to participate in a meaningful way in the Congressional debate about whether they should be gagged. Their ongoing inability to speak despite congressional action is a testament to the necessity of applying the Constitution and ensuring speedy judicial review. Speedy or not, we’ll fight on.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/re-matter-2011-national-security-letter">In re: National Security Letter 2011 (11-2173)</a></div><div class="field-item odd"><a href="/ar/cases/re-national-security-letter-2013-13-80089">In re National Security Letter 2013 (13-80089)</a></div><div class="field-item even"><a href="/ar/cases/re-national-security-letter-2013-13-1165">In re National Security Letter 2013 (13-1165)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Justice%20Delayed%3A%20Ninth%20Circuit%20Sends%20EFF%E2%80%99s%20NSL%20Cases%20Back%20for%20Consideration%20Under%20USA%20FREEDOM&amp;url=https%3A//www.eff.org/ar/deeplinks/2015/08/justice-delayed-ninth-circuit-sends-effs-nsl-cases-back-consideration-under-usa&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Justice%20Delayed%3A%20Ninth%20Circuit%20Sends%20EFF%E2%80%99s%20NSL%20Cases%20Back%20for%20Consideration%20Under%20USA%20FREEDOM&amp;u=https%3A//www.eff.org/ar/deeplinks/2015/08/justice-delayed-ninth-circuit-sends-effs-nsl-cases-back-consideration-under-usa" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2015/08/justice-delayed-ninth-circuit-sends-effs-nsl-cases-back-consideration-under-usa" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Justice%20Delayed%3A%20Ninth%20Circuit%20Sends%20EFF%E2%80%99s%20NSL%20Cases%20Back%20for%20Consideration%20Under%20USA%20FREEDOM&amp;url=https%3A//www.eff.org/ar/deeplinks/2015/08/justice-delayed-ninth-circuit-sends-effs-nsl-cases-back-consideration-under-usa" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Mon, 31 Aug 2015 15:48:50 +0000Cindy Cohn and Kurt Opsahl87569 at https://www.eff.orgNational Security LettersNSA SpyingCanarywatch.org Reaches 50 Canaries With the Addition of First Look Mediahttps://www.eff.org/ar/deeplinks/2015/06/canarywatchorg-reaches-50-canaries-addition-first-look-media
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>We’re excited to announce that <a href="https://canarywatch.org/">Canarywatch</a> has added its 50th canary: <a href="https://firstlook.org/canary">First Look Media</a>, the parent company for <i>The Intercept</i>—the news site created by journalists Glenn Greenwald, Laura Poitras, and Jeremy Scahill.</p>
<p>"Warrant canary" is a colloquial term for a regularly published statement that an internet service provider (ISP) has not received legal process that it would be prohibited from saying it had received, such as a <a href="https://www.eff.org/issues/national-security-letters">national security letter</a>.</p>
<p>Canarywatch.org is a collaboration between EFF, the<a href="http://cyber.law.harvard.edu/"> Berkman Center for Internet and Society,</a> New York University’s <a href="http://www.law.nyu.edu/academics/clinics/semester/technologylawandpolicy">Technology Law &amp; Policy Clinic</a>, and the <a href="https://calyxinstitute.org/">Calyx Institute</a>. The goal of <a href="https://www.eff.org/deeplinks/2015/01/eff-joins-coalition-launch-canarywatchorg">Canarywatch</a> is to educate people about warrant canaries, gather all the canaries we know of in one place, and help people with a special interest in canaries track them.</p>
<p>It’s been five months since Canarywatch launched, and since then the coalition has been inundated with submissions. The site initially launched with only 12 canaries. But since then, not only has Canarywatch had submissions of canaries we may not have known about, we’ve also seen some major sites, like <a href="http://blog.cheezburger.com/community/cheezburger-inc-2014-transparency-report/">Cheezburger.com</a> and <a href="https://www.defcon.org/html/links/dc-transparency.html">DEF CON</a> add canaries—some of them with direct references to Canarywatch.</p>
<p>First Look Media couldn’t be a more appropriate 50th canary. The publication launched last year with the <a href="https://firstlook.org/theintercept/about/">short-term goal</a> of “providing a platform to report on the documents previously provided by NSA whistleblower Edward Snowden.” The site even published a blog post entitled “<a href="https://firstlook.org/theintercept/2015/01/28/how-to-leak-to-the-intercept/">How to Leak to the Intercept</a>”, explaining how whistleblowers can use tools like Tor and SecureDrop. First Look has now taken the step of providing transparency of what national security requests the company has not received.</p>
<p>We’re thrilled that more and more companies are publishing canaries, and Canarywatch will keep adding them to the site as quickly as possible. If you know of a canary we’ve missed, please <a href="https://canarywatch.org/submission.html">let Canarywatch know</a> about it. If you’re an ISP considering publishing a canary or have received legal process, you can contact <a href="mailto:info@eff.org">info@eff.org</a> if you would like help finding counsel.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Canarywatch.org%20Reaches%2050%20Canaries%20With%20the%20Addition%20of%20First%20Look%20Media&amp;url=https%3A//www.eff.org/ar/deeplinks/2015/06/canarywatchorg-reaches-50-canaries-addition-first-look-media&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Canarywatch.org%20Reaches%2050%20Canaries%20With%20the%20Addition%20of%20First%20Look%20Media&amp;u=https%3A//www.eff.org/ar/deeplinks/2015/06/canarywatchorg-reaches-50-canaries-addition-first-look-media" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2015/06/canarywatchorg-reaches-50-canaries-addition-first-look-media" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Canarywatch.org%20Reaches%2050%20Canaries%20With%20the%20Addition%20of%20First%20Look%20Media&amp;url=https%3A//www.eff.org/ar/deeplinks/2015/06/canarywatchorg-reaches-50-canaries-addition-first-look-media" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 03 Jun 2015 17:08:55 +0000Dia Kayyali86197 at https://www.eff.orgCommentaryNational Security LettersWhen Is a Justice Department Rule Not a Rule? Report From Twitter's Transparency Fight https://www.eff.org/ar/deeplinks/2015/05/when-justice-department-rule-not-rule-report-recent-hearing-twitters-lawsuit
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>When is a government rule not a rule? Making that question difficult, when it should be simple, seems to be the government’s leading strategy in a hearing this week in <a target="_blank" href="https://g.twimg.com/blog/blog/attachments/Complaint.pdf">Twitter Inc.’s lawsuit</a> challenging the government’s squelching of its transparency report. Twitter wants to provide a closer look at how often federal agents are demanding private user data for surveillance, and part of its suit fights back against the government's rules on what it can and cannot publish. But the Justice Department has asked a federal judge in Oakland to dismiss portions of Twitter’s lawsuit because, it says, the rules the government cited in denying Twitter the ability to be more transparent aren’t really <i>rules</i>. They’re more like guidelines, the agency says. If you’re having flashbacks about ''Pirates of the Caribbean'' and a certain Captain Barbossa, you’re not alone. More on that later.</p>
<p><strong> Background</strong></p>
<p>Twitter filed its lawsuit in October, 2014, after it was <a target="_blank" href="https://blog.twitter.com/2014/continuing-our-fight-for-more-transparency">prohibited</a> from publishing a transparency report that would give its users a more complete picture of how many times the government—armed with orders from a secret court and the FBI—demanded customer information for national security surveillance. Specifically Twitter wanted to publish the actual aggregate number of spy agency data demands it received in the last half of 2014 and more precise information about the specific types of demands it got. The FBI said no, that information is classified. Importantly, the government said that the only way for Twitter to tell what was classified and what wasn't—in other words, the rules for what can be published and was cannot—was by reference to<a target="_blank" href="http://www.justice.gov/iso/opa/resources/366201412716018407143.pdf"> a letter </a>by the Justice Department Deputy Attorney General (DAG). That letter says that companies can only express the number of information demands they received in a ranges of 0 to 250 for aggregate national security requests.</p>
<p>The letter was sent to five technology companies that had sued over the right to publish information about national security requests. Twitter wasn’t a party in that case, but the government told Twitter that it was nonetheless limited by rules spelled out in the DAG letter.</p>
<p>In its lawsuit, Twitter argues that so sharply restricting what it can say about information of global public concern is a <a target="_blank" href="https://blog.twitter.com/2014/taking-the-fight-for-transparency-to-court">violation of free speech </a>rights, challenging the secrecy provisions of government Foreign Intelligence Surveillance Act (FISA) requests and FBI <a target="_blank" href="https://www.eff.org/issues/national-security-letters/faq">national security letters</a> (NSLs). EFF filed an <a target="_blank" href="https://www.eff.org/document/amicus-brief-26">amicus brief</a> in the case backing Twitter on behalf of two unnamed companies fighting the NSL gag provisions—a case before the United States Court of Appeals for the Ninth Circuit <a href="https://www.eff.org/cases/re-national-security-letter-2013-13-1165">right now</a>. The complaint also maintains that applying the DAG letter requirements to Twitter violates the Administrative Procedures Act (APA), <a target="_blank" href="http://www.archives.gov/federal-register/laws/administrative-procedure/">a law</a> that mandates federal agencies seek public comment and follow other procedures when making <i>rules </i>and permits courts to block regulations that were not properly promulgated.</p>
<p><strong>DOJ’s Strange Argument that Rules Aren’t Actually Rules</strong></p>
<p>That last claim was center stage at Wednesday's argument. The Justice Department lawyers asked<a target="_blank" href="http://www.cand.uscourts.gov/ygr"> U.S. District Judge Yvonne Gonzalez Rogers </a>in Oakland to throw out the APA challenge, saying the rules set forth in the DAG letter about what companies can disclose aren’t actually rules. They’re guidelines, said DOJ attorney Steven Bressler. He used an example of a portrait covered by a curtain and said that the DAG letter, far from being rules for Twitter, was merely a description of how the government had drawn the ''curtain back in part'' on otherwise classified information to let companies describe national security-related requests. But, he claimed, the DAG letter didn’t necessarily reflect the full amount of information that the law allowed to be revealed.</p>
<p>Gonzalez Rogers took issue with Bressler’s characterization, saying the DAG letter to tech companies established not mere guidelines, but a "protocol" defining ''specifically what they could do and how they could do it," indicating that to her, they sound quite a lot like rules. Bressler then said the DAG letter set forth a ''safe harbor,'' but that compliance with that letter wasn’t necessarily the only way one could comply with the law. ''Isn’t that exactly what it’s been used for now?" Gonzalez Rogers asked. Twitter sought to disclose information, ''and the response was—you cannot. See the DAG letter,'' Gonzalez Rogers said.</p>
<p>Why does the characterization of the DAG letter as a rule or just guidance matter? If Gonzalez Rogers decides that it’s a rule created without proper procedures and transparency, she should invalidate it. But if the Justice Department succeeds in convincing the court that the letter just sets out advisory guidelines and not enforceable rules, then there is nothing for Twitter to challenge—Twitter cannot challenge a mere suggestion made by the government. But the government could continue to use the letter as a way to coerce companies to not fully disclose the number of national security requests they receive, even though the First Amendment, and the NSA law itself, may permit them to disclose more. As the mythical Captain Barbossa said in ''Pirates of the Caribbean'' about keeping one’s word under the pirates’ code, ''<a target="_blank" href="http://piratesonline.wikia.com/wiki/Pirate%27s_Code">the code</a> is more what you’d call guidelines than actual rules."</p>
<p><strong>DOJ Says Send it to the Secret Court</strong></p>
<p>In addition to the ''rules are not rules'' argument, the Justice Department also asked Gonzalez Rogers to defer ruling on many of Twitter’s claims to the Washington-based Foreign Intelligence Surveillance Court or <a target="_blank" href="http://www.fisc.uscourts.gov/">FISC</a>. This is the secret court that was originally designed to merely approve individual surveillance orders in national security cases. The government’s argument is that since the laws that the government is using to gag it are generally applied by the FISC in the context of specific orders, the court should make Twitter go to the FISC to ask for relief from the gags. The problem with this argument is that, for purposes of this case, there is no evidence that Twitter is actually subject to any secret FISC orders—the government wants the court to defer to the secret court because such order <i>might </i>exist, despite the clear law providing that the secret court does not have the exclusive right to interpret the law applicable in national security cases. </p>
<p>Google and four other companies filed petitions with the FISC in 2013 for permission to publish more details about national security-related requests, which led to the DAG letter. DOJ lawyer Julia Berman told Gonzalez Rogers that no other party challenging a FISC order had filed suit in district court. The judge responded by saying courts are ''on relatively new ground in these cases,'' and asked whether the FISC, a court of very limited jurisdiction that almost always <a target="_blank" href="http://www.motherjones.com/mojo/2013/06/fisa-court-nsa-spying-opinion-reject-request">sides </a>with the government, had ever issued an opinion on broad First Amendment rights. It hadn’t, Berman said, which was the first time we’ve ever heard the government admit that the FISC has never really grappled broadly with the First Amendment issues raised by the national security gags.</p>
<p><strong>DOJ Says Dismiss Because It Might Win EFF’s NSL Case</strong></p>
<p>Finally, the government sought to have Twitter’s claim about the NSL gag provisions dismissed now, despite the Ninth Circuit’s <a target="_blank" href="https://www.eff.org/press/releases/media-alert-oral-arguments-effs-national-security-letter-case">pending consideration</a> of those provisions, because the Ninth Circuit <i>might</i> reverse the landmark ruling that EFF obtained that the NSL statutes are unconstitutional. Twitter argued, rightly, that the court need not take any action to dismiss claims on the off chance that another decision by a sister court will be reversed.</p>
<p>Gonzalez Rogers didn’t say when she’ll rule on the Twitter case. We hope she’ll find that the DAG letter is a rule, it’s invalid, and that Twitter’s challenge to the government’s unconstitutional restraint on free speech and transparency can proceed. </p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/twitter-v-holder">Twitter v. Holder</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=When%20Is%20a%20Justice%20Department%20Rule%20Not%20a%20Rule%3F%20Report%20From%20Twitter%27s%20Transparency%20Fight%20&amp;url=https%3A//www.eff.org/ar/deeplinks/2015/05/when-justice-department-rule-not-rule-report-recent-hearing-twitters-lawsuit&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=When%20Is%20a%20Justice%20Department%20Rule%20Not%20a%20Rule%3F%20Report%20From%20Twitter%27s%20Transparency%20Fight%20&amp;u=https%3A//www.eff.org/ar/deeplinks/2015/05/when-justice-department-rule-not-rule-report-recent-hearing-twitters-lawsuit" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2015/05/when-justice-department-rule-not-rule-report-recent-hearing-twitters-lawsuit" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=When%20Is%20a%20Justice%20Department%20Rule%20Not%20a%20Rule%3F%20Report%20From%20Twitter%27s%20Transparency%20Fight%20&amp;url=https%3A//www.eff.org/ar/deeplinks/2015/05/when-justice-department-rule-not-rule-report-recent-hearing-twitters-lawsuit" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 08 May 2015 21:02:17 +0000Karen Gullo85802 at https://www.eff.orgPrivacyNational Security LettersNSA SpyingEFF Joins Coalition to Launch Canarywatch.orghttps://www.eff.org/ar/deeplinks/2015/01/eff-joins-coalition-launch-canarywatchorg
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>"Warrant canary" is a colloquial term for a regularly published statement that an internet service provider (ISP) has not received legal process that it would be prohibited from saying it had received, such as a <a href="https://www.eff.org/issues/national-security-letters">national security letter</a>. The term "warrant canary" is a reference to the <a href="http://en.wikipedia.org/wiki/Animal_sentinel">canaries</a> used to provide warnings in coalmines, which would become sick from carbon monoxide poisoning before the miners would—warning of the otherwise-invisible danger. Just like canaries in a coalmine, the canaries on web pages “die” when they are exposed to something toxic—like a secret FISA court order.</p>
<p><a href="https://canarywatch.org/" title="canarywatch.org" target="_blank"><img src="/files/2015/02/02/canary-watch-graphic.png" width="326" height="197" alt="" class="image-right" /></a>Warrant canaries rely upon the legal theory of compelled speech. Compelled speech happens when a person is forced by the government to make expressive statements they do not want to make. Fortunately, the First Amendment protects against compelled speech in most circumstances. In fact, we’re not aware of any case where a court has upheld compelled false speech. Thus, a service provider could argue that, when its statement about the legal process received is no longer true, it cannot be compelled to reissue the now false statement, and can, instead, remain silent. So far, no court has addressed this issue.</p>
<p>But if you’re not paying attention to a specific canary, you may never know when it changes. Plenty of providers don’t have warrant canaries. Those that do may not make them obvious. And when warrant canaries do change, it’s not always immediately obvious what that change means.</p>
<p>That’s why EFF has joined with a coalition of organizations, including the<a href="http://cyber.law.harvard.edu/"> Berkman Center for Internet and Society,</a> New York University’s <a href="http://www.law.nyu.edu/academics/clinics/semester/technologylawandpolicy">Technology Law &amp; Policy Clinic</a>, and the <a href="https://calyx.net/">Calyx Institute</a> to launch <a href="https://www.canarywatch.org/">Canarywatch.org.</a> The Calyx Institute runs and hosts Canarywatch.org.</p>
<p>Canarywatch lists the warrant canaries we know about, tracks changes or disappearances of those canaries, and allows users to <a href="https://www.canarywatch.org/submission.html">submit canaries</a> not listed on the site. For people with interest in a particular canary, the site will show any changes we know about. The page’s <a href="https://www.canarywatch.org/faq.html">FAQ</a> explains the mechanics and legal theories underpinning warrant canaries. It also has an <a href="https://www.canarywatch.org/about.html#anatomy">anatomy of a canary</a> that, since canaries come in so many different forms, helps anyone understand what they’re seeing when they look at a particular canary.</p>
<p>Warrant canaries are a unique tool ISPs have to provide users with more transparency about the government requests they do, and do not, receive. We hope the site will educate, improve the usefulness of warrant canaries for the general public, and help people with a special interest in canaries track them.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=EFF%20Joins%20Coalition%20to%20Launch%20Canarywatch.org&amp;url=https%3A//www.eff.org/ar/deeplinks/2015/01/eff-joins-coalition-launch-canarywatchorg&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=EFF%20Joins%20Coalition%20to%20Launch%20Canarywatch.org&amp;u=https%3A//www.eff.org/ar/deeplinks/2015/01/eff-joins-coalition-launch-canarywatchorg" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2015/01/eff-joins-coalition-launch-canarywatchorg" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=EFF%20Joins%20Coalition%20to%20Launch%20Canarywatch.org&amp;url=https%3A//www.eff.org/ar/deeplinks/2015/01/eff-joins-coalition-launch-canarywatchorg" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Mon, 02 Feb 2015 20:04:54 +0000Dia Kayyali84332 at https://www.eff.orgNational Security LettersNSA SpyingMore Time in the Spotlight for NSLs : 2014 in Reviewhttps://www.eff.org/ar/deeplinks/2014/12/2014-national-security-letters-spotlight
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p class="MsoNormal"><a href="https://www.eff.org/deeplinks/2014/11/2014-year-review"><img src="/files/2014/12/19/2014-year-review.jpg" alt="" class="image-right" height="242" width="461" /></a>Last year, EFF took a <a href="https://www.eff.org/deeplinks/2013/12/2013-review-eff-convinces-court-declare-national-secruity-letters-unconstitutional">huge step</a> toward eliminating a highly problematic government surveillance tool—<a href="https://www.eff.org/issues/national-security-letters">national security letters</a> (NSLs). EFF clients won a major victory when a district court found that the NSL gag provision, which allows the government to bar recipients from speaking about NSLs without judicial review, is a prior restraint on speech in violation of the First Amendment. 2014 was a year of critical next steps and increasing attention for these often overlooked—but <a href="https://www.eff.org/deeplinks/2014/10/two-reports-about-fbis-use-national-security-letters-reissued">heavily used</a> (and sometimes <a href="https://www.eff.org/deeplinks/2008/04/eff-issues-report-abuse-national-security-letter">abused</a>)—tools.</p>
<p>On October 8, 2014, the United States Court of Appeals for the Ninth Circuit heard oral <a href="http://www.ca9.uscourts.gov/media/view.php?pk_id=0000013407">argument</a> in the government's appeal of the district court’s 2013 <a href="https://www.eff.org/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules">decision</a>. At argument, the court asked whether this gag order would bar recipients such as EFF’s clients from engaging in political debate about NSL reform. In contrast to its earlier position, the government responded to the court's question by claiming that NSL recipients can lobby Congress, thereby implicitly acknowledging that they have received an NSL. However, after EFF pressed the government on this inconsistency, the government sent a letter to the court <a href="https://www.eff.org/deeplinks/2014/11/unsealed-filing-shows-doj-misled-appeals-court-about-national-security-letter-gag">retracting</a> this statement—and conceding that the gag order extends to all discussion that might indicate receipt. </p>
<p>The limitations on what Internet companies can say about NSLs they receive were at the heart of another important NSL development. On January 27, the Deputy Attorney General sent a <a href="https://www.eff.org/document/deputy-attorney-general-transparency-reporting-letter">letter</a> to Google, Yahoo, Microsoft, LinkedIn, and Facebook that outlined two options for increased transparency reporting in response to actions these companies brought in the Foreign Intelligence Surveillance Court (FISC). The letter allows reporting about national security requests—including NSLs—in broad numerical bands. Neither of the options allows providers to definitively state that they have received zero NSLs.</p>
<p>Twitter didn't think this was good enough. On October 7, the <a href="https://blog.twitter.com/2014/taking-the-fight-for-transparency-to-court">company sued</a> the Department of Justice and the FBI, asking a federal court to declare it had the right to publish details about national security requests it did or didn't receive. Although Twitter wasn't a party to the companies’ FISC action, the government told Twitter it was bound by the terms of the Deputy Attorney General’s letter. Twitter’s <a href="https://g.twimg.com/blog/blog/attachments/Complaint.pdf">complaint</a> argues that it shouldn’t be bound by a settlement it wasn’t a party to, and asks the court to rule that NSL gag orders and judicial review procedures are unconstitutional.</p>
<p>Just this month, Nicholas Merrill, who ran an ISP called Calyx Internet Access, filed an <a href="http://isp.yale.edu/sites/default/files/page-attachments/merrill_v._holder_-_file-stamped_complaint.pdf">action</a> to finally dissolve the gag order tied to an NSL he received in 2004. Merrill previous challenge to NSLs resulted in a <a href="https://www.eff.org/deeplinks/2008/12/second-circuit-rules-against-national-security-let">decision</a> by the Second Circuit partially invalidating the NSL statute. But ten years later, he remains gagged about some elements of the NSL he received, even after the FBI’s investigation has been closed.</p>
<p>Finally, legislative reform of NSLs unfortunately wasn’t on the agenda for 2014. The USA Freedom Act, which <a href="https://www.eff.org/deeplinks/2014/11/eff-statement-senate-advancing-usa-freedom-act">died</a> in the Senate on November 8, included <a href="https://www.eff.org/deeplinks/2014/07/new-senate-usa-freedom-act-first-step-towards-reforming-mass-surveillance">small changes</a> to the statutes that govern NSLs. But those changes would have amounted to little more than the status quo. The legislation improved some judicial review procedures, and ensured NSLs wouldn’t be used for bulk collection, but it wouldn’t have cured the unconstitutionality of the NSL statute.</p>
<p>In 2015, we'll continue to spread awareness of NSLs and fight for accountability and oversight in the NSL process. To keep updated on what’s happening, check out our NSL <a href="https://www.eff.org/issues/national-security-letters">timeline</a>.</p>
<p class="MsoNormal">This article is part of our <em>Year In Review</em> series; <a href="https://www.eff.org/deeplinks/2014/11/2014-year-review">read other articles</a> about the fight for digital rights in 2014. Like what you're reading? EFF is a member-supported nonprofit, powered by donations from individuals around the world. <a href="https://eff.org/last-call">Join us today</a> and defend free speech, privacy, and innovation.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=More%20Time%20in%20the%20Spotlight%20for%20NSLs%20%3A%202014%20in%20Review&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/12/2014-national-security-letters-spotlight&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=More%20Time%20in%20the%20Spotlight%20for%20NSLs%20%3A%202014%20in%20Review&amp;u=https%3A//www.eff.org/ar/deeplinks/2014/12/2014-national-security-letters-spotlight" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2014/12/2014-national-security-letters-spotlight" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=More%20Time%20in%20the%20Spotlight%20for%20NSLs%20%3A%202014%20in%20Review&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/12/2014-national-security-letters-spotlight" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 26 Dec 2014 12:00:00 +0000Andrew Crocker and Dia Kayyali83668 at https://www.eff.orgNational Security LettersUnsealed Filing Shows DOJ Misled Appeals Court About National Security Letter Gag Orders https://www.eff.org/ar/deeplinks/2014/11/unsealed-filing-shows-doj-misled-appeals-court-about-national-security-letter-gag
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A <a href="https://www.eff.org/document/governments-letter-re-misstatement-oral-argument">court filing</a> unsealed late Wednesday shows that the U.S. Department of Justice (DOJ) made a highly misleading argument to an appeals court in October during a hearing on the constitutionality of National Security Letters (NSLs).</p>
<p>On October 8, the Electronic Frontier Foundation <a href="https://www.eff.org/press/releases/media-alert-oral-arguments-effs-national-security-letter-case">argued</a> before the United States Court of Appeals for the Ninth Circuit that provisions in the USA PATRIOT Act that prohibit service providers from discussing NSLs they may have received violates the First Amendment. During the hearing, the judges’ questioning addressed concerns that the government is using its NSL authority to stifle recipients’ constitutionally protected right to comment on the government’s actions. But DOJ Attorney Douglas Letter countered that these companies are free to discuss the “quality” of NSLs letter they received from the FBI—a claim that contradicted the government’s prior position and turned out not to be true.</p>
<p>Following the hearing, EFF’s clients requested that the DOJ reconcile the statement Letter made to the court with the department’s longstanding contention that companies could not discuss having received NSLs at all. In response, the DOJ filed <a href="https://www.eff.org/document/governments-letter-re-misstatement-oral-argument">a letter</a> with the court admitting that Letter’s statements were incorrect, reaffirming its position that the broad gag includes any statement about the NSLs they have received. The DOJ also apologized to the court.</p>
<p>EFF Legal Director Cindy Cohn issued the following statement in response to the retraction:</p>
<blockquote><p>EFF’s clients have consistently challenged the indiscriminate use of gag orders in combination with National Security Letters. In particular, they have challenged the government’s contention that NSL recipients can’t even use their experiences receiving overbroad NSLs to push for reform in Congress or in the broader public debate. This is especially the case now that the USA FREEDOM Act, which has some limited NSL reform, is going to be discussed in the Senate.</p>
<p>At the oral argument, the judges were very concerned that the government is using its NSL authority to stifle recipients’ constitutionally protected right to comment on the government’s actions. We were surprised to hear, in response to those concerns, the government retreat from its position that the NSLs gags prevent recipients from talking about "very fact of having received" an NSL.</p>
<p>When we wrote to the government asking if this new position meant that our clients could indeed talk about the quality of the NSLs they have received, the government retracted its statements to the court and apologized. But it's troubling that we had to raise the issue before the government addressed it and that it seems the government was willing to let the court believe that the gag was narrower than it actually is in order to win the case.</p></blockquote>
<p>EFF represents two companies challenging NSLs—a telecom company and an Internet company. The names of these companies remain under seal, as the government continues to insist that even identifying them might endanger national security. In March 2013 a federal district court judge in San Francisco agreed with EFF and <a href="https://www.eff.org/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules">ruled</a> the NSL provisions unconstitutional, barring future NSLs and accompanying gag orders. That ruling was stayed pending appeal, however, and the district court has subsequently enforced separate NSLs—including NSLs issued to both EFF clients—and indicates that it will continue to do so until the Ninth Circuit rules on EFF’s challenges.</p>
<p>Here's what Doug Letter originally told the court (mp3 available <a href="http://cdn.ca9.uscourts.gov/datastore/media/2014/10/08/13-15957.mp3">here</a>):</p>
<blockquote><p>There is a category that the deputy attorney general provided that recipients can make disclosures and there is a category of 0-249 so recipients can disclose that. They’re allowed to disclose within these bands. And they can fully participate in the public debate, they can say as we have disclosed we’re in that band 0-249 and it can say the very things that [EFF Senior Staff Attorney Kurt Opsahl] said they can’t. They can say and we think the government is asking for too much in many of the NSLs we received and we want to talk to our fellow recipients and see if they too have felt that there’s too much and we think Congress ought to do something about that. They can do all of that. There’s nothing that says that they can’t comment, they’re allowed to make specific comments about quantity, there’s absolutely no ban on them commenting on the quality of those they’ve received.</p></blockquote>
<p>Here's an excerpt from the subsequent retraction:</p>
<blockquote><p>In the course of discussing disclosures described in this letter, approximately 49 minutes into the Court's recording of the argument, government counsel indicated that if a company discloses that it is in one of these two bands starting with zero, it could publicly discuss the fact that it had received one or more NSLs and could discuss the quality of the specific NSL(s) that it had received. That suggestion was mistaken. The district court correctly noted that “the NSL nondisclosure provisions . . . apply, without distinction, to both the content of the NSLs and to the very fact of having received one."</p></blockquote>
<p>For the full text of the Justice Department's letter:</p>
<p><a href="https://www.eff.org/document/governments-letter-re-misstatement-oral-argument">https://www.eff.org/document/governments-letter-re-misstatement-oral-argument</a></p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div><div class="field-item odd"><a href="/ar/cases/re-matter-2011-national-security-letter">In re: National Security Letter 2011 (11-2173)</a></div><div class="field-item even"><a href="/ar/cases/re-national-security-letter-2013-13-80089">In re National Security Letter 2013 (13-80089)</a></div><div class="field-item odd"><a href="/ar/cases/re-national-security-letter-2013-13-1165">In re National Security Letter 2013 (13-1165)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Unsealed%20Filing%20Shows%20DOJ%20Misled%20Appeals%20Court%20About%20National%20Security%20Letter%20Gag%20Orders%20&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/11/unsealed-filing-shows-doj-misled-appeals-court-about-national-security-letter-gag&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Unsealed%20Filing%20Shows%20DOJ%20Misled%20Appeals%20Court%20About%20National%20Security%20Letter%20Gag%20Orders%20&amp;u=https%3A//www.eff.org/ar/deeplinks/2014/11/unsealed-filing-shows-doj-misled-appeals-court-about-national-security-letter-gag" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2014/11/unsealed-filing-shows-doj-misled-appeals-court-about-national-security-letter-gag" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Unsealed%20Filing%20Shows%20DOJ%20Misled%20Appeals%20Court%20About%20National%20Security%20Letter%20Gag%20Orders%20&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/11/unsealed-filing-shows-doj-misled-appeals-court-about-national-security-letter-gag" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 13 Nov 2014 20:49:28 +0000Dave Maass83154 at https://www.eff.orgNews UpdateNational Security LettersTransparencyTwo Reports About FBI's Use of National Security Letters Reissued https://www.eff.org/ar/deeplinks/2014/10/two-reports-about-fbis-use-national-security-letters-reissued
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Even the reports that are supposed to provide transparency about the FBI's use of <a href="//www.eff.org/issues/national-security-letters/">national security lettters</a> (NSLs) are secret—or at least a couple dozen pages of them are. NSLs are nonjudicial orders that allow the FBI to obtain information from companies, without a warrant, about their customers’ use of services. They almost always contain a gag order, which prohibits recipients from even saying they've received the request.</p>
<p>Two Office of the Inspector General (OIG) reports reviewing the FBI's use of NSLs from 2007 and 2008 were reissued earlier this week after having portions declassified. You can see the newly released versions of the 2007 report <a href="https://www.eff.org/document/reissued-2007-oig-report-nsls">here</a> and the 2008 report <a href="https://www.eff.org/document/reissued-2008-report-nsls">here</a>.</p>
<p>Charlie Savage at the New York Times has <a href="http://www.nytimes.com/interactive/2014/10/24/us/23-FBI-NSL-FOIA.html?_r=0">reviewed </a>and <a href="http://www.nytimes.com/interactive/2014/10/22/us/23-FBI-NSL-FOIA-2.html">listed</a> the changes. Some of them make sense. For example, one portion of the 2007 report masked references to a "Virginia Jihad network," which might have been redacted because of an ongoing investigation. But some of the previously classified portions are less explicable, such as the classification of the percentage of requests done under particular statutes. It's unclear what purpose keeping that number secret serves. What is clear is that excessive classification and redaction continue to get in the way of <a href="https://www.eff.org/issues/national-security-letters/faq#40">much-needed transparency</a> around NSLs.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div><div class="field-item odd"><a href="/ar/cases/re-matter-2011-national-security-letter">In re: National Security Letter 2011 (11-2173)</a></div><div class="field-item even"><a href="/ar/cases/re-national-security-letter-2013-13-80089">In re National Security Letter 2013 (13-80089)</a></div><div class="field-item odd"><a href="/ar/cases/re-national-security-letter-2013-13-1165">In re National Security Letter 2013 (13-1165)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Two%20Reports%20About%20FBI%27s%20Use%20of%20National%20Security%20Letters%20Reissued%20&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/10/two-reports-about-fbis-use-national-security-letters-reissued&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Two%20Reports%20About%20FBI%27s%20Use%20of%20National%20Security%20Letters%20Reissued%20&amp;u=https%3A//www.eff.org/ar/deeplinks/2014/10/two-reports-about-fbis-use-national-security-letters-reissued" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2014/10/two-reports-about-fbis-use-national-security-letters-reissued" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Two%20Reports%20About%20FBI%27s%20Use%20of%20National%20Security%20Letters%20Reissued%20&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/10/two-reports-about-fbis-use-national-security-letters-reissued" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 24 Oct 2014 17:58:43 +0000Dia Kayyali82835 at https://www.eff.orgNational Security LettersTransparencyEFF Response to FBI Director Comey's Speech on Encryptionhttps://www.eff.org/ar/deeplinks/2014/10/eff-response-fbi-director-comeys-speech-encryption
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>FBI Director James Comey <a href="http://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course">gave a speech</a> yesterday reiterating the FBI's nearly twenty-year-old talking points about why it wants to reduce the security in your devices, rather than help you increase it. Here's EFF's response:</p>
<p>The FBI should not be in the business of trying to convince companies to offer less security to their customers. It should be doing just the opposite. But that's what Comey is proposing—undoing a clear legal protection we fought hard for in the 1990s.<a class="see-footnote" id="footnoteref1_r025py5" title=" Here's the relevant part of CALEA that Comey wants to effectively undo: &quot;47 USC 1002(b)(3): A telecommunications carrier shall not be responsible for decrypting, or ensuring the government’s ability to decrypt, any communication encrypted by a subscriber or customer, unless the encryption was provided by the carrier and the carrier possesses the information necessary to decrypt the communication.&quot; Also from the CALEA legislative history: &quot;Finally, telecommunications carriers have no responsibility to decrypt encrypted communications that are the subject of court-ordered wiretaps, unless the carrier provided the encryption and can decrypt it. This obligation is consistent with the obligation to furnish all necessary assistance under 18 U.S.C. Section 2518(4). Nothing in this paragraph would prohibit a carrier from deploying an encryption service for which it does not retain the ability to decrypt communications for law enforcement access ... Nothing in the bill is intended to limit or otherwise prevent the use of any type of encryption within the United States. Nor does the Committee intend this bill to be in any way a precursor to any kind of ban or limitation on encryption technology. To the contrary, section 2602 protects the right to use encryption.&quot; H/T Chris Soghoian: http://paranoia.dubfire.net/2010/09/calea-and-encryption.html" href="#footnote1_r025py5">1</a> The law specifically ensures that a company is <strong>not </strong>required to essentially become an agent of the FBI rather than serving your security and privacy interests. Congress rightly decided that companies (and free and open source projects and anyone else building our tools) should be allowed to provide us with the tools to lock our digital information up just as strongly as we can lock up our physical goods. That's what Comey wants to undo.</p>
<p>It's telling that his remarks echo so closely the arguments of that era. Compare them, for example, with this comment from former FBI Director Louis Freeh in May of 1995, now nearly twenty years ago:</p>
<blockquote><p>[W]e're in favor of strong encryption, robust encryption. The country needs it, industry needs it. We just want to make sure we have a trap door and key under some judge's authority where we can get there if somebody is planning a crime.</p></blockquote>
<p>Now just as then, the FBI is trying to convince the world that some fantasy version of security is possible—where "good guys" can have a back door or extra key to your home but bad guys could never use it. Anyone with even a rudimentary understanding of security can tell you <a href="https://www.schneier.com/blog/archives/2014/10/iphone_encrypti_1.html">that's just not true</a>. So the "debate" Comey calls for is phony, and we suspect he knows it. Instead, Comey wants everybody to have weak security, so that when the FBI decides somebody is a "bad guy," it has no problem collecting personal data.</p>
<p>That's bad science, it's bad law, it's bad for companies serving a global marketplace that may not think the FBI is always a "good guy," and it's bad for every person who wants to be sure that their data is as protected as possible—whether from ordinary criminals hacking into their email provider, rogue governments tracking them for politically organizing, or competing companies looking for their trade secrets. </p>
<p>Perhaps Comey's speech is saber rattling. Maybe it's an attempt to persuade the American people that we've undertaken significant reforms in light of the Snowden revelations—the U.S. government has not—and that it's time for the "pendulum" to swing back. Or maybe by putting this issue in play, the FBI may hope to draw our eyes away from, say, its attempt to water down the <a href="https://www.eff.org/deeplinks/2013/11/floor-not-ceiling-supporting-usa-freedom-act-step-towards-less-surveillance">National Security Letter reform</a> that Congress is considering. It's difficult to tell.</p>
<p>But if the FBI gets its way and convinces Congress to change the law, or even if it convinces companies like Apple that make our tools and hold our data to weaken the security they offer to us, we'll all end up less secure and enjoying less privacy. Or as the Fourth Amendment puts it: we'll be be less "secure in our papers and effects."</p>
<p>For more on EFF's coverage of the "new" Crypto Wars, read this <a href="https://news.vice.com/article/what-default-phone-encryption-really-means-for-law-enforcement">article focusing on the security issues</a> we wrote last week in Vice. And going back even earlier, a <a href="https://www.eff.org/deeplinks/2014/09/nine-epic-failures-regulating-cryptography">broader update</a> to a piece we wrote in 2010, which itself was was based on our fights in the 90s. If the FBI wants to try to resurrect this old debate, EFF will be in strong opposition, just as we were 20 years ago. That's because—just like 20 years ago—the Internet needs more, not less, strong encryption.</p>
<ul class="footnotes"><li class="footnote" id="footnote1_r025py5"><a class="footnote-label" href="#footnoteref1_r025py5">1.</a> Here's the relevant part of CALEA that Comey wants to effectively undo: "47 USC 1002(b)(3): A telecommunications carrier shall not be responsible for decrypting, or ensuring the government’s ability to decrypt, any communication encrypted by a subscriber or customer, unless the encryption was provided by the carrier and the carrier possesses the information necessary to decrypt the communication." Also from the CALEA legislative history: "Finally, telecommunications carriers have no responsibility to decrypt encrypted communications that are the subject of court-ordered wiretaps, unless the carrier provided the encryption and can decrypt it. This obligation is consistent with the obligation to furnish all necessary assistance under 18 U.S.C. Section 2518(4). Nothing in this paragraph would prohibit a carrier from deploying an encryption service for which it does not retain the ability to decrypt communications for law enforcement access ... Nothing in the bill is intended to limit or otherwise prevent the use of any type of encryption within the United States. Nor does the Committee intend this bill to be in any way a precursor to any kind of ban or limitation on encryption technology. To the contrary, section 2602 protects the right to use encryption." H/T Chris Soghoian: <a href="http://paranoia.dubfire.net/2010/09/calea-and-encryption.html">http://paranoia.dubfire.net/2010/09/calea-and-encryption.html</a></li>
</ul></div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/bernstein-v-us-dept-justice">Bernstein v. US Department of Justice</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=EFF%20Response%20to%20FBI%20Director%20Comey%27s%20Speech%20on%20Encryption&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/10/eff-response-fbi-director-comeys-speech-encryption&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=EFF%20Response%20to%20FBI%20Director%20Comey%27s%20Speech%20on%20Encryption&amp;u=https%3A//www.eff.org/ar/deeplinks/2014/10/eff-response-fbi-director-comeys-speech-encryption" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2014/10/eff-response-fbi-director-comeys-speech-encryption" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=EFF%20Response%20to%20FBI%20Director%20Comey%27s%20Speech%20on%20Encryption&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/10/eff-response-fbi-director-comeys-speech-encryption" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 17 Oct 2014 19:33:23 +0000Cindy Cohn82749 at https://www.eff.orgCommentaryPrivacyCALEAEncrypting the WebLaw Enforcement AccessNational Security LettersSecurityMedia Alert: Oral Arguments in EFF’s National Security Letter Casehttps://www.eff.org/ar/press/releases/media-alert-oral-arguments-effs-national-security-letter-case
<div class="field field-name-field-pr-subhead field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Ninth Circuit Court of Appeals to Stream October 8 Hearing on Key Patriot Act Tool</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><em>Update: The court announced early Wednesday that it will not livestream the audio of the NSL case. Audio available here http://www.ca9.uscourts.gov/media/view.php?pk_id=0000013407.<br /></em></p>
<p>San Francisco, CA - The Electronic Frontier Foundation (EFF) will urge a federal appeals court next week to uphold a groundbreaking ruling that the National Security Letter (NSL) provisions of the USA Patriot Act are unconstitutional. The hearing is set for 9 a.m. on October 8 in San Francisco.</p>
<p>Months before Edward Snowden kicked off the international debate over electronic surveillance, EFF scored a major victory when a federal judge ordered the FBI to cease its practice of issuing NSLs—demands to telecommunication providers to provide information about their users that are not approved in advance by a judge.</p>
<p>The lower court found that the gag orders, which are almost always issued by the FBI in tandem with the NSLs, violate the First Amendment. In EFF's cases, these gag orders have forced EFF's clients to keep their identities hidden, preventing them from discussing the NSLs publicly or even revealing their involvement in this case. The court also found that the limited, after-the-fact judicial review procedures violate the separation of powers.</p>
<p>EFF Senior Staff Attorney Kurt Opsahl will deliver oral arguments at the hearing at the United States Court of Appeals for the Ninth Circuit. Audio of the arguments will be live streamed through the court's website. The identity of the clients will not be disclosed in Wednesday's hearing.</p>
<p>What: Oral Arguments in Under Seal v. Eric Holder, Jr. (consolidated cases)</p>
<p>Who: EFF Senior Staff Attorney Kurt Opsahl</p>
<p>When: 9 a.m. PT, Oct. 8, 2014</p>
<p>Where: James R. Browning Courthouse, Courtroom 4<br />
95 7th Street<br />
San Francisco, CA</p>
<p>Opsahl will be available for interviews at the courthouse immediately after the hearing.</p>
<p>Applications to bring a camera into the courtroom must be submitted by the close of business on Friday, Oct. 3. Details at: <a href="http://www.ca9.uscourts.gov/news_media/">http://www.ca9.uscourts.gov/news_media/ </a></p>
<p>Live oral arguments will be streamed at:<br /><a href="http://www.ca9.uscourts.gov/media/view_video.php?pk_vid=0000006581">http://www.ca9.uscourts.gov/media/view_video.php?pk_vid=0000006581</a></p>
<p>For EFF's briefs:<br /><a href="https://www.eff.org/files/2014/03/27/nsl.13-15957.13-16731.secondoffourbriefs.redacted.0320141.pdf">https://www.eff.org/files/2014/03/27/nsl.13-15957.13-16731.secondoffourbriefs.redacted.0320141.pdf </a></p>
<p><a href="https://www.eff.org/files/2014/07/08/casesqw.reply_.brief_.redacted.pdf">https://www.eff.org/files/2014/07/08/casesqw.reply_.brief_.redacted.pdf </a></p>
<p>For more on NSLs, visit our NSL Frequently Asked Questions page:<br /><a href="https://www.eff.org/issues/national-security-letters/faq%20">https://www.eff.org/issues/national-security-letters/faq </a></p>
</div></div></div><div class="field field-name-field-contact field-type-node-reference field-label-above"><div class="field-label">Contact:&nbsp;</div><div class="field-items"><div class="field-item even"><div class="ds-1col node node-profile view-mode-node_embed clearfix">
<div class="">
<div class="field field-name-field-profile-first-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Dave</div></div></div><div class="field field-name-field-profile-last-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Maass</div></div></div><div class="field field-name-field-profile-title field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Investigative Researcher</div></div></div><div class="field field-name-field-profile-email field-type-email field-label-hidden"><div class="field-items"><div class="field-item even"><a href="mailto:dm@eff.org">dm@eff.org</a></div></div></div> </div>
</div>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Media%20Alert%3A%20Oral%20Arguments%20in%20EFF%E2%80%99s%20National%20Security%20Letter%20Case&amp;url=https%3A//www.eff.org/ar/press/releases/media-alert-oral-arguments-effs-national-security-letter-case&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Media%20Alert%3A%20Oral%20Arguments%20in%20EFF%E2%80%99s%20National%20Security%20Letter%20Case&amp;u=https%3A//www.eff.org/ar/press/releases/media-alert-oral-arguments-effs-national-security-letter-case" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/press/releases/media-alert-oral-arguments-effs-national-security-letter-case" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Media%20Alert%3A%20Oral%20Arguments%20in%20EFF%E2%80%99s%20National%20Security%20Letter%20Case&amp;url=https%3A//www.eff.org/ar/press/releases/media-alert-oral-arguments-effs-national-security-letter-case" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 02 Oct 2014 20:07:26 +0000Dave Maass82513 at https://www.eff.orgUnderstanding the New USA FREEDOM Act: Questions, Concerns, and EFF’s Decision to Support the Billhttps://www.eff.org/ar/deeplinks/2014/08/understanding-new-usa-freedom-act-questions-concerns-and-effs-decision-support
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Ever since the Snowden revelations, honest (and <a href="https://www.eff.org/deeplinks/2014/04/nsa-reform-bill-intelligence-community-written-intelligence-community-and">some dishonest</a>) efforts have been made in Congress to try to scale back at least some of the NSA’s spying. It’s a complex problem, since the NSA has overstepped reasonable bounds in so many different directions and there is intense secrecy surrounding the NSA’s activities and legal analysis.</p>
<p>The bill with the best chance to make some positive change currently is the Senate version of USA FREEDOM Act, a <a href="https://www.eff.org/deeplinks/2014/07/new-senate-usa-freedom-act-first-step-towards-reforming-mass-surveillance">new piece of legislation</a> with an older name.</p>
<p>After extensive analysis and internal discussion, EFF has decided to support this bill. But given the complexities involved, we wanted to lay out our thinking in more detail for our friends and allies.</p>
<p>Senator Leahy introduced S. 2685, the USA FREEDOM Act of 2014, last week. It’s clearly a vast improvement over the version of the bill that passed out of the House.<a class="see-footnote" id="footnoteref1_jo9nrpl" title="Some background may be helpful here: When USA FREEDOM was originally introduced in October of 2013, EFF called it a floor, not a ceiling. We supported the bill, but cautioned that it was just a first step towards NSA spying reform and still had some problematic pieces. But we were hopeful because it had bipartisan support in both the House and the Senate. Most importantly, we believed that it could start to address intelligence agency overreach. Unfortunately, months later, a drastically altered bill was introduced as a manager’s amendment in the House of Representatives. We made it clear that this bill, the result of political compromises, never earned our support. It passed out of the House as H.R. 3361. The current Senate version of USA FREEDOM is not as strong as the original version, but far stronger than what passed out of the House." href="#footnote1_jo9nrpl">1</a> It would also be an improvement over current law.</p>
<p>But it still has problems, some of which are inherent in any attempt to legislate in the shadow of national security. Specifically, we’ve seen the NSA and the <a href="http://www.intelligence.gov/mission/member-agencies.html">intelligence community</a> twist common words into tortured and unlikely interpretations to try to excuse their surveillance practices. We’re worried that, for all its good intentions, the bill may leave room for the intelligence community to continue to do so. Due to the secretive nature of surveillance, it will be difficult to ensure the intelligence community is not abusing its powers. And finally, this bill is a compromise between those who seek to reform the NSA and those who want to defend the status quo. Those compromises often fell short of what we’d hope for in comprehensive NSA reform.</p>
<p><b>Bad Faith Interpretations of the Bill’s Language</b></p>
<p>We now know that the NSA plays <a href="https://www.eff.org/deeplinks/2013/08/guide-deceptions-word-games-obfuscations-officials-use-mislead-public-about-nsa">word games</a> when it comes to interpreting the Foreign Intelligence Surveillance Act (FISA) and the Constitution. Words like “<a href="https://www.eff.org/deeplinks/2014/07/deeper-dive-effs-backbone-motion">collect</a>” and “target” have meanings for the NSA that no ordinary person would use. Words like “relevant” have been stretched far beyond any reasonable interpretation. </p>
<p>The new USA FREEDOM Act is also vulnerable to this kind of misuse. The language has wiggle room and ambiguity in places that we tried to get rid of, and failed. It also likely has language that can be misused that we haven’t yet recognized. While the clear intent of the bill is to end bulk collection of call detail records and bring more transparency to the NSA, the government could attempt to argue in bad faith that the bill does not require either.</p>
<p>Folks have begun pointing out where this is possible and we think this effort should continue. Specifically, <a href="http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/05/27/the-nsa-freedom-act/">some have emphasized</a> that the bill only has extra restrictions for “daily” call record collection, like the collection the government currently does. They’ve argued that this means that the government can continue bulk collection if it simply crafts its request for call detail records, say, on a weekly or yearly basis. This interpretation of the legislation doesn’t take into account the additional restrictions imposed on any requests not made under the new language, but it’s still concerning.</p>
<p>Others have pointed out that the government can still get a second set of call detail records (a second “hop”) if there’s a “direct connection” to the first specific selection term. But the term “direct connection” is undefined. <a href="http://www.emptywheel.net/2014/07/28/improved-usa-freedom-retains-connection-chaining-and-foreign-intelligence-retention/">Some have noted</a> that the government could interpret “direct connection” to include the physical proximity of two mobile devices, or being in someone’s address book, since both might be called “direct”—yet the bill is trying to stop that sort of surveillance by association.</p>
<p>While we do believe that the intent of the bill is to disallow either of these scenarios, some additional clarity in the language would really help here, especially given the secrecy discussed below.</p>
<p>We hope the entire community of people concerned about mass surveillance will join us in poring over this bill and helping to identify other areas where additional clarity is needed.</p>
<p><b>Secrecy May Still Undermine Accountability </b></p>
<p>We’ve only gotten this far in ensuring that ordinary people know how pervasive surveillance really is due to whistleblowers like <a href="https://www.eff.org/files/filenode/att/presskit/ATT_onepager.pdf">Mark Klein</a>, William Binney, Thomas Drake, J. Kirk Wiebe, Edward Snowden and countless anonymous whistleblowers, as well as the tenacious efforts of litigators under the <a href="https://www.eff.org/deeplinks/2014/03/sunshine-week-recap-how-effs-foia-litigation-helped-expose-nsas-domestic-spying">Freedom of Information Act</a>. Intelligence agencies like the NSA and FBI have fought hard to maintain as much secrecy as possible, only opening up when cornered. </p>
<p>While there is significant new transparency required by the USA FREEDOM Act, much will remain secret, and some of those secrets may undermine our ability to know whether the bill has actually achieved the reform it is aimed at. Some government secrecy in national security investigations may be merited of course, but even 20 years ago, Senator Daniel Moynihan <a href="https://en.wikipedia.org/wiki/Moynihan_Commission_on_Government_Secrecy">documented</a> the problems arising from the government’s rampant overclassification.</p>
<p>Even after USA FREEDOM, the FISA Court (FISC) will continue to approve requests <a href="https://www.eff.org/deeplinks/2014/04/in-one-sided-foreign-intelligence-surveillance-court-its-hard-to-get-whole-story">in secret</a>. While we are pleased that the bill creates a panel of special advocates to argue for civil liberties in the FISC, <a href="http://thehill.com/blogs/congress-blog/judicial/213137-fixing-what-ails-the-fisa">more is needed</a>—and even these advocates have limitations. For example, the advocate role is limited and advocates can only be appointed upon the government’s approval. In addition, special advocates have security clearance restrictions—an opportunity for the executive branch to block an advocate by denying a clearance or arguing an advocate doesn’t have adequate clearance to access certain documents. Perhaps most concerning, the intelligence community will continue to determine what legal interpretations by the FISC will be made public.</p>
<p>By its very nature, national security law is hard to assess because of the secrecy that surrounds it. USA FREEDOM is no exception.</p>
<p><b>Compromises in the USA FREEDOM Act</b></p>
<p>This bill is a first step. And it’s a small step because Senator Leahy’s goal was to introduce something that had a real chance of passing this Congress and not getting vetoed by President Obama.</p>
<p>Some of the compromises in this bill are obvious. It does less than the original USA FREEDOM. It doesn’t simply outlaw bulk collection, as EFF has <a href="https://www.eff.org/deeplinks/2013/10/nsa-spying-congress-stop-intelligence-committee-and-what-watch-upcoming-bills">long advised</a>. It doesn’t give the Privacy and Civil Liberties Oversight Board subpoena authority. It has special advocate and declassification provisions that will help transparency, but they aren’t as strong as the original USA FREEDOM Act. It doesn’t address bulk Internet collection under Section 702 of the FISA Amendments Act substantively at all and it pushes out the sunset date on Section 215 from 2015 to 2017, when the FISA Amendments Act is scheduled to sunset.</p>
<p>But some of the compromises in the bill are less apparent, especially if you haven’t been poring over NSA spying legislation. We are also particularly concerned with how the bill deals with the FBI. The FBI is exempt from Section 702 reporting, and the bill appears to provide a path for the FBI to get permanent gag orders in connection with <a href="https://www.eff.org/issues/national-security-letters">national security letters</a>. </p>
<p><b>Why We Support the Bill, Even with Our Concerns</b></p>
<p>Despite these concerns, EFF supports the USA FREEDOM Act as a first step in spying reform. We believe it ensures that the government will be collecting less information about innocent people, that it creates an independent voice to argue for privacy in the FISA Court, and that it will provide modest transparency improvements that will assist in accountability. The second and third of those would not be possible through litigation alone. </p>
<p>What’s more, we believe that this bill will help move comprehensive reform forward. It will show that the growing global community concerned about mass surveillance can band together and get legislation passed. We know that the original Foreign Intelligence Surveillance Act was not enacted until 1978, three <a href="https://www.eff.org/nsa-spying/timeline">years after the Church Committee</a> was formed. We are in this for the long haul.</p>
<p>Some wonder why we’d support legislation when we have litigation proceeding against Section 215 call records surveillance that could be sent back for further review if the law passes. While we’re very confident in our case, litigation is a long process and we’ve seen that progress in the courts can be undermined by subsequent legislation— our original case against AT&amp;T was killed by Congress when it passed the FISA Amendments Act. So if we can end the telephone records collection in Congress, it may be a more lasting win. </p>
<p>Finally, there is value in Congress reacting to the <a href="https://www.eff.org/deeplinks/2013/10/polls-continue-show-majority-americans-against-nsa-spying">clear consensus</a>: Americans of all political stripes think the NSA has gone too far—they do not support indiscriminate surveillance. Congress is where that political consensus should be expressed.</p>
<p><b>Your Support</b></p>
<p>This post lays out why we decided to support USA Freedom, and also many of our concerns. We made our decision based on the current version and we will not hesitate to pull our support if the bill gets watered down. </p>
<p>But we also support efforts of the community to raise these or other concerns and push Congress to clarify and plug the holes. Since Congress is in recess we have a month to go before this has any chance of getting to the floor, and we’ll be continuing to scour the bill with a fine-toothed comb. We look forward to assistance. We also respect those who have decided that they cannot support this bill without further changes, even significant ones.</p>
<p>In the meantime, if you agree with us that USA FREEDOM is a reasonable first step in the long project of surveillance reform, <a href="https://standagainstspying.org/scorecard/">find out</a> where your representatives stand and let them know what you think by <a href="https://standagainstspying.org/">tweeting at them</a>, <a href="https://act.eff.org/action/end-the-nsa-s-mass-spying">sending an email</a>, or even <a href="https://www.eff.org/deeplinks/2014/08/one-way-stand-against-spying-meet-legislator">setting up an in-district meeting</a> over the Congressional recess.</p>
<ul class="footnotes"><li class="footnote" id="footnote1_jo9nrpl"><a class="footnote-label" href="#footnoteref1_jo9nrpl">1.</a> Some background may be helpful here: When USA FREEDOM was originally introduced in October of 2013, EFF called it a floor, not a ceiling. We supported the bill, but cautioned that it was just a first step towards NSA spying reform and still had some problematic pieces. But we were hopeful because it had bipartisan support in both the House and the Senate. Most importantly, we believed that it could start to address intelligence agency overreach.
<p>Unfortunately, months later, a drastically altered bill was introduced as a manager’s amendment in the House of Representatives. We made it clear that this bill, the result of political compromises, never earned our support. It passed out of the House as H.R. 3361. The current Senate version of USA FREEDOM is not as strong as the original version, but far stronger than what passed out of the House.</p></li>
</ul></div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/jewel">Jewel v. NSA</a></div><div class="field-item odd"><a href="/ar/cases/first-unitarian-church-los-angeles-v-nsa">First Unitarian Church of Los Angeles v. NSA</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Understanding%20the%20New%20USA%20FREEDOM%20Act%3A%20Questions%2C%20Concerns%2C%20and%20EFF%E2%80%99s%20Decision%20to%20Support%20the%20Bill&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/08/understanding-new-usa-freedom-act-questions-concerns-and-effs-decision-support&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Understanding%20the%20New%20USA%20FREEDOM%20Act%3A%20Questions%2C%20Concerns%2C%20and%20EFF%E2%80%99s%20Decision%20to%20Support%20the%20Bill&amp;u=https%3A//www.eff.org/ar/deeplinks/2014/08/understanding-new-usa-freedom-act-questions-concerns-and-effs-decision-support" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2014/08/understanding-new-usa-freedom-act-questions-concerns-and-effs-decision-support" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Understanding%20the%20New%20USA%20FREEDOM%20Act%3A%20Questions%2C%20Concerns%2C%20and%20EFF%E2%80%99s%20Decision%20to%20Support%20the%20Bill&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/08/understanding-new-usa-freedom-act-questions-concerns-and-effs-decision-support" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 07 Aug 2014 19:30:23 +0000Cindy Cohn and Dia Kayyali81716 at https://www.eff.orgNational Security LettersNSA SpyingPATRIOT ActWarrant Canary Frequently Asked Questionshttps://www.eff.org/ar/deeplinks/2014/04/warrant-canary-faq
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p class="MsoNormal"><b><img src="/files/2014/04/10/canary-1-sq.png" width="265" height="265" alt="" class="image-right" />What is a warrant canary?</b></p>
<p class="MsoNormal">A warrant canary is a colloquial term for a regularly published statement that a service provider has <b>not</b> received legal process that it would be prohibited from saying it had received. Once a service provider does receive legal process, the speech prohibition goes into place, and the canary statement is removed.</p>
<p class="MsoNormal">Warrant canaries are often provided in conjunction with a transparency report, listing the process the service provider can publicly say it received over the course of a particular time period. The canary is a reference to the <a href="http://en.wikipedia.org/wiki/Animal_sentinel">canaries</a> used to provide warnings in coalmines, which would become sick before miners from carbon monoxide poisoning, warning of the danger. </p>
<p class="MsoNormal"><b>How might a warrant canary work in practice?</b></p>
<p class="MsoNormal">An ISP might issue a semi-annual transparency report, stating that it had not received any national security letters in the six month period. NSLs come with a gag, which purports to prevent the recipient from saying it has received one. (While a federal court has ruled that <a href="https://www.eff.org/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute">the NSL gag is unconstitutional</a>, that order is currently stayed pending the government’s appeal). When the ISP issues a subsequent transparency report without that statement, the reader may infer from the silence that the ISP has now received an NSL.</p>
<p class="MsoNormal"><b>Why would an ISP want to publish a warrant canary?</b></p>
<p class="MsoNormal">“<em>Sunlight is said to be the best of disinfectants</em>.” – <a href="https://en.wikipedia.org/wiki/Louis_Brandeis">Justice Louis D. Brandeis</a>.</p>
<p class="MsoNormal">We are in a time of unprecedented public debate over the government’s powers to secretly obtain information about people. The revelations about the massive NSA bulk surveillance program have raised serious questions about whether these powers are necessary, legal and constitutional. Secret surveillance violates not only the privacy interests of the account holder, but the speech interests of ISPs who wish to participate in these public debates.</p>
<p class="MsoNormal"><b>Why should we care about publicizing secret legal process like national security letters?</b></p>
<p class="MsoNormal">As part of the reauthorization of the Patriot Act in 2006, Congress directed the DOJ Inspector General to investigate and report on the FBI’s use of NSLs. In three reports issued between <a href="http://www.usdoj.gov/oig/special/s0703b/final.pdf">2007</a>, <a href="http://www.usdoj.gov/oig/special/s0703b/final.pdf">2008</a> and <a href="http://www.justice.gov/oig/special/s1001r.pdf">2010</a>, the IG documented the agency’s systematic and extensive misuse of NSLs.</p>
<p class="MsoNormal">The reports showed that between 2003 and 2006, the FBI’s intelligence violations included improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL statutes, and unauthorized information collection through NSLs. The FBI’s improper practices included requests for information based on First Amendment protected activity.</p>
<p class="MsoNormal">In December 2013, the President’s Review Group on Intelligence and Communications Technologies <a href="http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf">recommended</a> public reporting—both by the government and NSL recipients—of the number of requests made, the type of information produced, and the number of individuals whose records have been requested.</p>
<p class="MsoNormal">As discussed below, NSLs are just one type of gagged legal process. Similar <a href="http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html">problems persist</a> in other forms of secret process.</p>
<p class="MsoNormal"><b>Is it legal to publish a warrant canary?</b></p>
<p class="MsoNormal">There is no law that prohibits a service provider from reporting all the legal processes that it has <b>not</b> received. The gag order only attaches after the ISP has been served with the gagged legal process. Nor is publishing a warrant canary an obstruction of justice, since this intent is not to harm the judicial process, but rather to engage in a public conversation about the extent of government investigatory powers.</p>
<p class="MsoNormal"><b>What are some of the gagged legal processes that an ISP might receive?</b></p>
<p class="MsoNormal">An ISP may be gagged from stating it has received any one of several types of national security letters, orders from the Foreign Intelligence Surveillance Court (like the Section 215 orders used for the bulk call records program and the Section 702 orders used for the NSA’s PRISM program), or even an ordinary subpoena when accompanied by a gag order pursuant to the Electronic Communication Privacy Act. The government has issued hundreds of thousands of these gagged legal requests, but very few have ever seen the light of day. </p>
<p class="MsoNormal"><b>What does the government say is permissible for recipients of gagged legal process?</b></p>
<p class="MsoNormal">The government <a href="http://www.justice.gov/iso/opa/resources/366201412716018407143.pdf">allows</a> ISPs to report receipt of gagged legal process in ranges of 1000, starting at 0, for six-month periods. So if an ISP received 654 NSLs, it could report 0-999. If the companies choose to report FISC requests and NSL requests combined, they can use ranges of 250, again starting at 0. For example, Apple reported receiving 0-249 national security requests in the first half of 2013 and AT&amp;T reported 0-999 content FISC orders, 0-999 non-content FISC orders and 2000-2999 NSLs for the same period. </p>
<p class="MsoNormal">While the government-approved ranges all start at zero, publication of a range indicates that the ISP has received at least one, as otherwise the ISP would have no obligation to follow the government’s formula. </p>
<p class="MsoNormal">In contrast to the government-approved ranges, warrant canaries can be much more specific, making the it easier to determine what sort of legal process an ISP has been served with.</p>
<p class="MsoNormal"><b>What’s the legal theory behind warrant canaries?</b></p>
<p class="MsoNormal">The First Amendment protects against compelled speech. For example, a court held that the New Hampshire state government could not require its citizens to have “Live Free or Die” on their license plates. While the government may be able to compel silence through a gag order, it may not be able to compel an ISP to lie by falsely stating that it has not received legal process when in fact it has. </p>
<p class="MsoNormal"><b>Have courts upheld compelled speech?</b></p>
<p class="MsoNormal">Rarely. In a few instances, the courts have upheld compelled speech in the commercial context, where the government shows that the compelled statements convey important truthful information to consumers. For example, warnings on cigarette packs are a form of compelled commercial speech that have sometimes been upheld, and sometimes struck down, depending on whether the government shows there is a rational basis for the warning.</p>
<p class="MsoNormal"><b>Have courts upheld compelled false speech?</b></p>
<p class="MsoNormal">No, and the cases on compelled speech have tended to rely on truth as a minimum requirement. For example, Planned Parenthood challenged a requirement that physicians tell patients seeking abortions of an increased risk of suicidal ideation. The court found that Planned Parenthood did not meet its burden of showing that the disclosure was untruthful, misleading, or not relevant to the patient’s decision to have an abortion.</p>
<p class="MsoNormal"><b>Are there any cases upholding warrant canaries?</b></p>
<p class="MsoNormal">Not yet. EFF believes that warrant canaries are legal, and the government should not be able to compel a lie. To borrow a phrase from <a href="http://books.google.com/books?id=o6rFno1ffQoC&amp;lpg=PA215&amp;ots=Qyg9IdLg2_&amp;dq=quote%20%22no%20one%20can%20guar%C2%ADan%C2%ADtee%20suc%C2%ADcess%20in%20war%2C%20but%20only%20deserve%20it%22&amp;pg=PA215#v=onepage&amp;q=quote%20%22no%20one%20can%20guar%C2%ADan%C2%ADtee%20suc%C2%ADcess%20in%20war,%20but%20only%20deserve%20it%22&amp;f=false">Winston Churchill</a>, no one can guarantee success in litigation, but only deserve it.</p>
<p class="MsoNormal"><b>What should an ISP do if the warrant canary is triggered?</b></p>
<p class="MsoNormal">If an ISP with a warrant canary receives gagged legal process, it should obtain legal counsel and go to a court for a determination that it cannot be required to publish false information. While some ISPs may be tempted to engage in civil disobedience, EFF believes that it is better to present the issue to a court, to help establish a precedent. If you run an ISP with a warrant canary and receive gagged legal process, contact <a href="mailto:info@eff.org">info@eff.org</a> if you would like help finding counsel. </p>
<p class="MsoNormal"><b>How often should an ISP publish the warrant canary?</b></p>
<p class="MsoNormal">Various ISPs have published canaries on a wide range of schedules. To allow time to file a case and for the court to rule on the important legal questions, we suggest at least few months between the transparency report and the time period covered.</p>
<p class="MsoNormal"><b>Who has issued warrant canaries?</b></p>
<p class="MsoNormal">A number of service providers have issued warrant canaries, including:</p>
<ul><li><a href="http://images.apple.com/pr/pdf/131105reportongovinforequests3.pdf">Apple</a> (“Apple has never received an order under Section 215 of the USA Patriot Act.”)</li>
<li><a href="http://electricembers.coop/about-us/privacy-policy/">Electric Embers</a> ("<span>Since our beginnings in 2003, we have received and complied with 0 (zero) government requests for information.")</span></li>
<li><a href="http://www.espionageapp.com/">Espionageapp.com</a> (“We have not placed any backdoors into our software and have not received any requests for doing so. Pay close attention to any modifications to the previous sentence, and verify the signature of this "watch zone" by viewing the page source. Our public GPG key can be found using this ID: A884B988”)</li>
<li><a href="https://www.lookout.com/transparency/report-2013">Lookout</a> (“Furthermore, as of the date of this report, Lookout has not received a national security order and we have not been required by a FISA court to keep any secrets that are not in this transparency report.”)</li>
<li><a href="http://www.magusnet.com/canary.html">MagusNet</a> (picture of a warrant canary with the statement, “No Warrants. No Searches, No Seizures [sic] at Magus Net, LLC.”)</li>
<li><a href="http://blog.pinterest.com/post/78882077135/our-first-transparency-report">Pinterest</a>. (“National security: 0”)</li>
<li><a href="https://help.riseup.net/canary">Rise Up</a> (“<span>Riseup has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order by a FISA court</span>.”)</li>
<li><a href="http://www.rsync.net/resources/notices/canary.txt">Rsync.net</a> (“No warrants have ever been served to rsync.net, or rsync.net principals or employees. No searches or seizures of any kind have ever been performed on rsync.net assets . . . .”)</li>
<li><a href="http://transparency.tumblr.com/tagged/national-security-issues">Tumblr</a> (“As of the date of publication of this report, we have never received a National Security Letter, FISA order, or any other classified request for user information.”)</li>
<li><a href="http://www.vilain.com/wp/">Vilain</a> (“THE FBI HAS NOT BEEN HERE (watch very closely for the removal of this sign).”)</li>
<li><a href="https://www.mywickr.com/en/downloads/Wickr_Transparency_Report_12.20.pdf">Wickr</a> (“As of the date of this report, Wickr has not been required by a FISA request to keep any secrets that are not in this transparency report as part of a national security order.”)</li>
</ul><p><em>Update April 21, 2014: Updated link and quote for Rise Up's policy, added Electric Embers.</em></p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Warrant%20Canary%20Frequently%20Asked%20Questions&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/04/warrant-canary-faq&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Warrant%20Canary%20Frequently%20Asked%20Questions&amp;u=https%3A//www.eff.org/ar/deeplinks/2014/04/warrant-canary-faq" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2014/04/warrant-canary-faq" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Warrant%20Canary%20Frequently%20Asked%20Questions&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/04/warrant-canary-faq" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 10 Apr 2014 19:09:38 +0000Kurt Opsahl79865 at https://www.eff.orgLegal AnalysisPrivacyNational Security LettersNSA SpyingPATRIOT ActAn NSA "Reform Bill" of the Intelligence Community, Written by the Intelligence Community, and for the Intelligence Communityhttps://www.eff.org/ar/deeplinks/2014/04/nsa-reform-bill-intelligence-community-written-intelligence-community-and
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Representatives Mike Rogers and Dutch Ruppersberger, the leaders of the House Intelligence Committee, introduced <a href="https://web.archive.org/web/20140330205444/http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/FISAmar2514asintroduced.pdf">HR 4291, the FISA Transparency and Modernization Act</a> (.pdf), to end the collection of all Americans' calling records using <a href="https://www.eff.org/document/215-one-pager-adv">Section 215 of the Patriot Act</a>. Both <a href="https://web.archive.org/web/20140330205730/http://www.pbs.org/newshour/bb/government_programs-july-dec13-surveillance1_10-29/">have</a> <a href="https://web.archive.org/web/20131029221617/http://www.huffingtonpost.com/2013/10/27/mike-rogers-nsa-surveillance_n_4167901.html">vehemently</a> <a href="https://web.archive.org/web/20131028053535/http://www.reuters.com/article/2013/10/27/us-usa-security-idUSBRE99Q07E20131027">defended</a> the program since June, and it's reassuring to see two of the strongest proponents of NSA's actions agreeing with privacy advocates' (and the <a href="https://www.eff.org/deeplinks/2013/10/polls-continue-show-majority-americans-against-nsa-spying">larger</a> <a href="https://www.eff.org/deeplinks/2013/06/multiple-new-polls-show-americans-reject-wholesale-nsa-domestic-spying">public's</a>) demands to end the program. The bill only needs 17 lines to stop the calling records program, but it weighs in at more than 40 pages. Why? Because the “reform” bill tries to create <i>an entirely new government "authority" to collect other electronic data</i>.<i> </i></p>
<p><b>Collecting All Americans' Calling Records Is So 2012</b></p>
<p>The bill only ends the government collection of all Americans' calling records using Section 215 of the Patriot Act—a good, albeit very small, first step. It also tries to prohibit the mass collection of other records like firearm sales and tax records. Unfortunately, it may still allow the government to argue for such collection as long as the NSA uses a "specific identifier or selection term." In short: the government may still try to search these records, and potentially other records. The bill leaves almost all of Section 215 as-is; the sole fix being that the section would no longer apply to calling records. The bill also stays mum on the NSA's ability to mass spy on financial records, credit card records, or other purchasing records using Section 215.</p>
<p><b>Collecting All Americans' Internet Records Is the Future</b></p>
<p>The next twenty pages of the bill create a process where the government sends orders directed at electronic communication service providers for the collection of "records created as a result of communications of an individual or facility."</p>
<p>The words simply switch out one form of unconstitutional mass collection for another. And this latter version is even scarier than the mass collection of Americans' calling records. A "facility" could include an entire Internet Service Provider (ISP) like Comcast, or company like "Google." And the bill's use of "electronic communication" doesn't use the definition <a href="http://www.law.cornell.edu/uscode/text/50/1801">found in the Foreign Intelligence Surveillance Act (FISA)</a>, but the one <a href="http://www.law.cornell.edu/uscode/text/18/2510">found in criminal law,</a> which includes any transfer of data like uploaded documents to the cloud, calendar entries, or address book entries. Under the bill, the government might try to argue that the order can collect <em>any</em> type of record created as the result of <em>any</em> "electronic communication" as long as the communication is of an agent of a foreign power or someone in contact with the agent or foreign power. This is an incredibly broad standard.</p>
<p>What's worse is that the order doesn't need prior judicial approval of who is targeted, where the information is supposed to be collected, and why the government is searching for the information. The new order could collect the content of the communication or US personal information like credit card numbers, social security numbers, names, or addresses. That's because the order must only be "reasonably designed" to not acquire such information. There is no mandate in the bill banning such collection or deleting such information upon collection.</p>
<p>The new order' has "civil liberties and privacy protection procedures," written by the Attorney General and the Director of National Intelligence. But don't let the name fool you. The procedures only have to "reasonably limit" the collection, retention, or searching of records not useful for foreign intelligence information. It's too bad that "foreign intelligence information" is essentially defined in FISA to mean "<a href="https://www.eff.org/deeplinks/2013/11/nsas-surveillance-powers-extend-far-beyond-terrorism-despite-governments">everything</a>." The procedures are reviewed every year by the FISA Court, and once accepted, the government sends out orders to companies for records without any additional judicial approval.</p>
<p>The above procedures to minimize certain information ("minimization procedures") take after ones found in <a href="https://www.eff.org/document/702-one-pager-adv">Section 702 of the Foreign Intelligence Surveillance Amendments Act</a>, which is used to unconstitutionally mass collect innocent users' phone calls and emails. Unfortunately, the procedures in Section 702 fail at even nominally protecting innocent users communications. Section 702 <a href="http://www.law.cornell.edu/uscode/text/50/1881a">requires</a> the procedures to be "reasonably designed" to exclude wholly domestic American communications. Despite the fact that the FISA Court found the NSA collecting tens of thousands of such emails, the Court <a href="https://www.eff.org/deeplinks/2013/09/government-releases-nsa-surveillance-docs-and-previously-secret-fisa-court">thought</a> NSA's targeting procedures were still "reasonable." We also know that the procedures fail <a href="https://www.eff.org/deeplinks/2013/09/gems-mined-nsa-docs-released-today">time</a> <a href="https://www.eff.org/deeplinks/2013/06/recently-revealed-nsa-procedures-likely-ones-found-unconstitutional-fisa-court">after time</a> and are designed to <i>retain and search </i>the very communications the NSA isn't supposed to be retaining and searching. Both are good reasons to think such procedures won't work for the bill's newly devised order. We won't even know how much they fail (or succeed) because the procedures are filed in secret and stamped classified. Keeping the law secret <a href="https://web.archive.org/web/form-submit.jsp?url=http%3A%2F%2Fwww.thedailybeast.com%2Farticles%2F2014%2F02%2F17%2Fspy-chief-we-should-ve-told-you-we-track-your-calls.html&amp;type=replay&amp;date=20140307162056">worked out well in the past</a>, so it should work out well in the future, right?</p>
<p>The bill is what's expected from the House Intelligence Committee. The committee was created to oversee the intelligence community, but it has been coopted for quite some time. Though it stops the mass collection of all Americans' calling records, the bill's creation of a new order to conduct unconstitutional mass spying on <i>any record created by a communication</i> is disturbing. And it's a bill that will surely fail to pass Congress when real reform bills that would stop all uses of Section 215 to conduct mass spying, like the <a href="https://www.eff.org/deeplinks/2013/11/floor-not-ceiling-supporting-usa-freedom-act-step-towards-less-surveillance">USA Freedom Act</a>, are already on the table. <a target="_self" href="https://stopwatching.us/?r=eff">Tell Congress now</a> to support NSA reform that will stop every government use of Section 215 to mass spy on innocent users.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=An%20NSA%20%22Reform%20Bill%22%20of%20the%20Intelligence%20Community%2C%20Written%20by%20the%20Intelligence%20Community%2C%20and%20for%20the%20Intelligence%20Community&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/04/nsa-reform-bill-intelligence-community-written-intelligence-community-and&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=An%20NSA%20%22Reform%20Bill%22%20of%20the%20Intelligence%20Community%2C%20Written%20by%20the%20Intelligence%20Community%2C%20and%20for%20the%20Intelligence%20Community&amp;u=https%3A//www.eff.org/ar/deeplinks/2014/04/nsa-reform-bill-intelligence-community-written-intelligence-community-and" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2014/04/nsa-reform-bill-intelligence-community-written-intelligence-community-and" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=An%20NSA%20%22Reform%20Bill%22%20of%20the%20Intelligence%20Community%2C%20Written%20by%20the%20Intelligence%20Community%2C%20and%20for%20the%20Intelligence%20Community&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/04/nsa-reform-bill-intelligence-community-written-intelligence-community-and" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 02 Apr 2014 16:39:13 +0000Lee Tien79726 at https://www.eff.orgNational Security LettersNSA SpyingSecurityEFF Fights National Security Letter Demands on Behalf of Telecom, Internet Companyhttps://www.eff.org/ar/press/releases/eff-fights-national-security-letter-demands-behalf-telecom-internet-company
<div class="field field-name-field-pr-subhead field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Legal Briefings Still Under Seal After Government Demands for Secrecy</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>San Francisco - The Electronic Frontier Foundation (EFF) filed two briefs on Friday challenging secret government demands for information known as National Security Letters (NSLs) with the Ninth Circuit Court of Appeals.<span> </span>The briefs—one filed on behalf of a telecom company and another for an Internet company—remain under seal because the government continues to insist that even identifying the companies involved might endanger national security.<span> </span></p>
<p class="MsoNormal">While the facts surrounding the specific companies and the NSLs they are challenging cannot be disclosed, their legal positions are already public: the NSL statute is a violation of the First Amendment as well as the constitutional separation of powers.</p>
<p class="MsoNormal">“The NSL statute allows the FBI to demand potentially protected information without any court oversight,” EFF Senior Staff Attorney Matt Zimmerman said.<span> </span>“Furthermore, it permits the FBI to independently gag recipients so that NSL recipients like our clients have no ability to notify their customers or the public that any demands were made, let alone that they went to court to stop them.<span> </span>Our clients strongly desire to bring their unique perspectives to the ongoing national discussion on intrusive government spying, and they have timely and relevant information to contribute to that debate. However, the FBI’s unconstitutional NSL authority prevents these companies from exercising their rights and taking part in this critically important conversation.”</p>
<p class="MsoNormal">In <a href="https://www.eff.org/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute">March 2013</a> a federal district court judge in San Francisco agreed with EFF and ruled the NSL provisions unconstitutional, barring future NSLs and accompanying gag orders. <span> </span>That ruling was stayed pending appeal, however, and the district court has subsequently enforced separate NSLs—including NSLs issued to both EFF clients—and indicates that it will continue to do so until the Ninth Circuit rules on EFF’s challenges.<span> </span></p>
<p class="MsoNormal">“The fight over NSLs and the government’s dangerous practice of bypassing meaningful review by the judicial branch is not an academic one—real people and real companies are involved, battling for their constitutional rights and the rights of their users,” Zimmerman said.<span> </span>“The district court was right: the First Amendment prevents the FBI from engaging in such invasive, secretive, and unaccountable activities.<span> </span>We are eager to explain to the Court of Appeals why it should come to the same conclusion.”</p>
<p class="MsoNormal">EFF also recently re-launched its Frequently Asked Questions page on National Security Letters. Read it at: <a href="https://www.eff.org/issues/national-security-letters-faq">https://www.eff.org/issues/national-security-letters-faq</a></p>
<p class="MsoNormal">For more on the National Security Letter cases: <a href="https://www.eff.org/cases/re-matter-2011-national-security-letter">https://www.eff.org/cases/re-matter-2011-national-security-letter</a></p>
<p>Contact:</p>
<p>Matt Zimmerman<br />
Senior Staff Attorney<br />
Electronic Frontier Foundation<br />
<a href="mailto:mattz@eff.org">mattz@eff.org</a></p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=EFF%20Fights%20National%20Security%20Letter%20Demands%20on%20Behalf%20of%20Telecom%2C%20Internet%20Company&amp;url=https%3A//www.eff.org/ar/press/releases/eff-fights-national-security-letter-demands-behalf-telecom-internet-company&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=EFF%20Fights%20National%20Security%20Letter%20Demands%20on%20Behalf%20of%20Telecom%2C%20Internet%20Company&amp;u=https%3A//www.eff.org/ar/press/releases/eff-fights-national-security-letter-demands-behalf-telecom-internet-company" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/press/releases/eff-fights-national-security-letter-demands-behalf-telecom-internet-company" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=EFF%20Fights%20National%20Security%20Letter%20Demands%20on%20Behalf%20of%20Telecom%2C%20Internet%20Company&amp;url=https%3A//www.eff.org/ar/press/releases/eff-fights-national-security-letter-demands-behalf-telecom-internet-company" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Mon, 03 Mar 2014 12:45:08 +0000Dave Maass79162 at https://www.eff.orgPete Seeger and the NSAhttps://www.eff.org/ar/deeplinks/2014/02/pete-seeger-and-nsa
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><blockquote><p><em> "I am not going to answer any questions as to my association, my philosophical beliefs, or how I voted in any election, or any of these private affairs. I think these are very improper questions for any American to be asked, especially under such compulsion as this."</em></p>
<p><em>Pete Seeger, 1955, <a href="http://www.peteseeger.net/HUAC.htm">testimony pursuant to subpoena before the House Un-American Activities Committee</a>.</em> </p></blockquote>
<p><img class="align-right" src="/files/2014/02/02/pete-seeger.png" alt="" height="347" width="300" />The world lost a clear, strong voice for peace, justice, and community with <a href="http://www.nytimes.com/2014/01/29/arts/music/pete-seeger-songwriter-and-champion-of-folk-music-dies-at-94.html">the death of singer and activist Pete Seeger</a> last week. While Seeger was known as an outspoken musician not shy about airing his political opinions, it’s also important to remember he was once persecuted for those opinions, despite breaking no law. And the telling of this story should give pause to those who claim to be unconcerned about the government's metadata seizure and search programs that reveal our associations to the government today. <span></span></p>
<p>In 1955, Seeger was called before the House Un-American Activities Committee, where he defiantly refused to answer questions about others who he associated with and who shared his political beliefs and associations, believing Congress was violating his First Amendment rights. He was especially concerned about revealing his associations:</p>
<blockquote><p><em>I will be glad to tell what songs I have ever sung, because singing is my business. . . . But I decline to say who has ever listened to them, who has written them, or other people who have sung them.</em></p></blockquote>
<p>But if the same thing were to happen today, a Congressional subpoena and a public hearing wouldn’t be necessary for the government to learn all of our associations and other "private affairs." Since the NSA has been collecting and keeping them, they could just get that same information from their own storehouses of our records.</p>
<p>According to the Constitution, the government is supposed to meet a high standard before collecting this private information about our associations, especially the political ones that the Congressmen were demanding of Seeger. For instance, under the First Amendment, it must <a href="https://www.eff.org/cases/first-unitarian-church-los-angeles-v-nsa#legal-tests">“serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.”</a></p>
<p>It doesn't matter whether the government wants associations to look for possibly "illegal" activities of civil rights activists, Communist sympathizers, anarchists, trade unionists, war resisters, gun rights activists, environmental activists, drug legalization advocates, or wants to go after legitimate criminals and potential terrorists, if the government can't justify the collection of this "metadata" on this "strict scrutiny" standard, they’re not allowed to collect any of it. Yet right now, they collect <em>all</em> of it.</p>
<p>We're still learning of all the ways the government is able to track our associations without anything like the due process and standards required by the First and Fourth Amendments, but it is the centerpiece of the NSA's mass telephone records collection program under Patriot Act section 215, which EFF is fighting with our <a href="https://www.eff.org/cases/first-unitarian-church-los-angeles-v-nsa">First Unitarian Church v. NSA</a> case that focuses on the right of association. Our lead client, the First Unitarian Church of Los Angeles, had its own role in resisting the House Un-American Activities Committee. It's also part and parcel of the mass collection of content and metadata of people all around the world under section 702 of the FISA Amendments Act. And it's a real concern even if the companies hold the data, as we've seen with the FBI's self-certified <a href="https://www.eff.org/cases/re-matter-2011-national-security-letter">National Security Letters</a> and the <a href="https://www.eff.org/document/diaz-rivera-amicus-brief">Hemisphere</a> program, where AT&amp;T employees are embedded in government investigations so that they can more readily search through our phone records for the FBI, the DEA and others.</p>
<p>Each of these programs effectively allows the government to do to you what Pete Seeger refused to let them do to him—track your associations, beliefs and other private affairs without proper legal protections. And they can do this at scale that was unimaginable in 1955, thanks to the digital nature of our communications, the digital tools that allow them to search automatically rather than by hand and the fact that so much more about these private affairs is in the hands of third parties like our phone and internet companies.</p>
<p>While Seeger escaped jail, he was convicted of contempt for his failure to answer these questions. Thankfully Joseph McCarthy and the Un-American Activities Committees were later widely condemned, and Americans understandably look back sadly and with embarrassment on time when the Committee forced Americans to reveal their own associations, along with the associations and beliefs of others. With the passing of moral and artistic heroes like Seeger, we should redouble our efforts to make sure that our "private affairs" remain safe and the government's ability to access them remains subject to careful controls.</p>
<p>Join us on February 11 for the <a href="https://thedaywefightback.org/">day we fight back</a> against mass surveillance. </p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div><div class="field-item odd"><a href="/ar/cases/jewel">Jewel v. NSA</a></div><div class="field-item even"><a href="/ar/cases/first-unitarian-church-los-angeles-v-nsa">First Unitarian Church of Los Angeles v. NSA</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Pete%20Seeger%20and%20the%20NSA&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/02/pete-seeger-and-nsa&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Pete%20Seeger%20and%20the%20NSA&amp;u=https%3A//www.eff.org/ar/deeplinks/2014/02/pete-seeger-and-nsa" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2014/02/pete-seeger-and-nsa" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Pete%20Seeger%20and%20the%20NSA&amp;url=https%3A//www.eff.org/ar/deeplinks/2014/02/pete-seeger-and-nsa" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Sun, 02 Feb 2014 01:21:48 +0000Cindy Cohn78678 at https://www.eff.orgCommentaryFree SpeechNational Security LettersNSA SpyingTransparencyNew Decision Shows How Businesses Can Challenge Warrantless Records Collection, Even if You Can'thttps://www.eff.org/ar/deeplinks/2013/12/new-decision-shows-how-businesses-can-challenge-warrantless-records-collection
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Much of the debate over modern surveillance—including the NSA mass spying controversy—has centered around whether people can reasonably expect that records about their telephone and Internet activity can remain private when those records belong to someone else: the service providers. Courts <a href="https://www.eff.org/deeplinks/2013/12/historic-ruling-federal-judge-declares-nsa-mass-phone-surveillance-likely">have</a> <a href="https://www.eff.org/deeplinks/2013/12/judges-dismissal-aclu-case-disappointing-fight-over-programs-legality-far-over">disagreed</a> on whether the 1979 Supreme Court case <a href="http://scholar.google.com/scholar_case?case=3033726127475530815"><em>Smith v. Maryland</em></a>, which ruled people have no expectation of privacy in the phone numbers they dial, should be <a href="https://www.eff.org/deeplinks/2013/12/landmark-decision-important-beyond-nsa-phone-records-collection">extended</a> to cover newer, more invasive forms of technology. But a decision released on December 24th by the Ninth Circuit Court of Appeals looks at the issue from the point of view of businesses, providing a glimpse into how service providers and technology companies could challenge the government's unconstitutional surveillance.</p>
<p>In <em><a href="http://cdn.ca9.uscourts.gov/datastore/opinions/2013/12/24/08-56567.pdf">Patel v. City of Los Angeles</a></em>, the Ninth Circuit found a city ordinance that required hotels and motels to turn over guest records without any judicial process violated the <a href="http://www.law.cornell.edu/constitution/fourth_amendment">Fourth Amendment</a>. The ordinance mandated hotels and motels keep a record for 90 days containing things like a guest's name and address, the make, model and license plate number of the guest's car, and the room number assigned and rate charged. The ordinance allowed police to inspect guest records without a search warrant or the hotel's consent at any time. The city believed that collecting the records would deter drug dealing and prostitution, as people would be less inclined to rent a room if police could get access to guest information at any time. Failure to turn the records over was a misdemeanor crime.</p>
<p>The court found that the hotels and motels had an expectation of privacy in their business records, even if those records didn't contain anything of great personal value to the hotel. This was true even if the users themselves didn't have an expectation of privacy in the records. Because the ordinance didn't have a mechanism to allow the hotels and motels to obtain judicial review of whether the demand was reasonable before applying criminal penalties for non-compliance, the Ninth Circuit ruled the ordinance violated the Fourth Amendment. This procedural requirement—obtaining judicial review—is important, so that companies aren't at the mercy of the "unbridled discretion" of officers in the field, who would be free to arbitrarily choose when, whom, and how frequently to inspect a particular business. </p>
<p>This decision provides ammunition for companies to challenge receipt of other forms of surveillance requests, including <a href="https://www.eff.org/issues/national-security-letters">National Security Letters</a> which are issued without any oversight or judicial review and require the recipient to remain silent about the fact it even received a request.</p>
<p>More broadly, <em>Patel</em> shows <a href="https://www.eff.org/deeplinks/2012/08/service-agreements-kill-privacy-can-they-create-it-too">yet again</a> that the Fourth Amendment doesn't die once you turn information over to a business. If courts are going to reject user challenges to government demands for their data, then it's up to the companies to step up to safeguard not only the data entrusted to them by their users, but the data that presumably belong to the companies themselves. As major tech companies have called for NSA <a href="https://www.eff.org/deeplinks/2013/12/eight-tech-giants-call-reform-surveillance-law">reform</a> and have taken steps to implement <a href="https://www.eff.org/deeplinks/2013/11/encrypt-web-report-whos-doing-what">technological</a> protections to safeguard their users' data, this decision shows that they can also make legal challenges in court. While Yahoo! unsuccessfully <a href="http://www.wired.com/threatlevel/2013/06/yahoo-failed-fisa-fight/">challenged</a> an order requiring it turn over data to the NSA under the PRISM program, the phone companies themselves have made <a href="http://bigstory.ap.org/article/fisa-judge-no-challenges-phone-records-orders">no legal challenges</a> to the NSA's bulk collection of phone records, which at least one judge has found to be <a href="http://legaltimes.typepad.com/files/obamansa.pdf">unconstitutional.</a> This must change so that the public can take advantage of the conveniences of new technologies without having to sacrifice privacy.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/jewel">Jewel v. NSA</a></div><div class="field-item odd"><a href="/ar/cases/first-unitarian-church-los-angeles-v-nsa">First Unitarian Church of Los Angeles v. NSA</a></div><div class="field-item even"><a href="/ar/cases/city-los-angeles-v-patel">City of Los Angeles v. Patel</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=New%20Decision%20Shows%20How%20Businesses%20Can%20Challenge%20Warrantless%20Records%20Collection%2C%20Even%20if%20You%20Can%27t&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/12/new-decision-shows-how-businesses-can-challenge-warrantless-records-collection&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=New%20Decision%20Shows%20How%20Businesses%20Can%20Challenge%20Warrantless%20Records%20Collection%2C%20Even%20if%20You%20Can%27t&amp;u=https%3A//www.eff.org/ar/deeplinks/2013/12/new-decision-shows-how-businesses-can-challenge-warrantless-records-collection" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2013/12/new-decision-shows-how-businesses-can-challenge-warrantless-records-collection" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=New%20Decision%20Shows%20How%20Businesses%20Can%20Challenge%20Warrantless%20Records%20Collection%2C%20Even%20if%20You%20Can%27t&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/12/new-decision-shows-how-businesses-can-challenge-warrantless-records-collection" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 03 Jan 2014 19:22:15 +0000Hanni Fakhoury78179 at https://www.eff.orgLegal AnalysisPrivacyCell TrackingLocational PrivacyNational Security Letters2013 in Review: EFF Convinces Court to Declare National Security Letters Unconstitutional - President's Panel Agreeshttps://www.eff.org/ar/deeplinks/2013/12/2013-review-eff-convinces-court-declare-national-secruity-letters-unconstitutional
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><i><img src="/files/styles/medium/public/2013/12/26/2013-3-square_1.jpg?itok=W3Ii_bCu" alt="2013 in Review" class="image-medium image-left" height="150" width="220" />As the year draws to a close, EFF is looking back at the major trends influencing digital rights in 2013 and discussing where we are in the fight for free expression, innovation, fair use, and privacy. Click <a href="https://www.eff.org/deeplinks/2013/12/2013-review">here</a> to read other blog posts in this series.</i></p>
<p>In a banner year, one of EFF's court victories stands out: 2013 is the year EFF took a huge step towards taking out a piece of the USA PATRIOT Act. In the spring, <a href="https://www.eff.org/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules">we convinced</a> a federal district judge to strike down as unconstitutional a National Security Letter (NSL) statute. And we got a big vote of support on December 20 when the President’s Review Group on Intelligence and Communications Technologies <a href="http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf">called for the banning of NSLs in their current form</a>, stating that it was “unable to identify a principled reason why NSLs should be issued by FBI officials” when similar processes must issue from judges.</p>
<p>NSLs, relatively narrow (though still hugely problematic) national security investigative tools <a href="https://www.fas.org/sgp/crs/intel/RL33320.pdf">when they were created</a> in the 80s, were dramatically expanded by the USA PATRIOT Act in 2001. With an NSL, and without any prior court approval or oversight whatsoever, the FBI can compel entities such as telephone companies, Internet service providers, and banks and other financial institutions to turn over records revealing intimate and possibly constitutionally-protected details about their customers, such as the identities of anonymous online speakers and their associations. Worse yet, again without any court approval, the FBI can indefinitely gag NSL recipients, preventing them from even disclosing that they received one.</p>
<p>In March, in a <a href="https://www.eff.org/files/filenode/nsl_order_scan.pdf">strong opinion</a>, Senior District Court Judge Susan Illston of the Northern District of California <a href="https://www.eff.org/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute">granted EFF’s petition</a>—brought on behalf of an unnamed telephone company—to set aside the challenged NSL. Judge Illston agreed that 18 U.S.C. § 2709, the NSL statute in question, was facially unconstitutional because it granted unilateral power to the FBI to silence NSL recipients and that this unconstitutional gag rendered the entire process unlawful. Judge Illston ordered the FBI to cease both issuing future NSLs as well as enforcing any NSL-related gag orders, but, as is often the case in national security cases, the court stayed its groundbreaking order pending appeal. Briefing for the appeal begins in January.</p>
<p>How important is Judge Illston’s decision? NSLs—now found to be illegal in their entirety by the district court—have <a href="http://online.wsj.com/news/articles/SB10001424052702303567704577519213906388708">been a ubiquitous tool</a> used by the FBI over the past decade, with the FBI issuing over 85 requests each and every day on average, amounting to over 300,000 since the passage of the USA PATRIOT Act. Without a requirement that a court sign off on its exercise of this unprecedented power, and no meaningful transparency built into the system, the FBI has been <a href="http://www.usdoj.gov/oig/special/s0703b/final.pdf">repeatedly tempted</a> over the years to <a href="http://www.usdoj.gov/oig/special/s0803b/final.pdf">cut corners</a> and even on occasion to <a href="http://www.washingtonpost.com/wp-dyn/content/article/2007/03/20/AR2007032000921.html">blatantly</a> <a href="http://www.justice.gov/oig/special/s1001r.pdf">misuse this extraordinary power</a>.</p>
<p>The FBI has repeatedly argued that NSLs are <a href="http://www.washingtonpost.com/wp-dyn/content/article/2007/03/08/AR2007030802356_2.html">necessary tools</a>. However, with a wide range of other options under existing laws that permit the FBI to obtain exactly the same information but <i>with</i> court supervision, the government is in essence arguing for the right to collect sensitive information on its own, without anyone looking over its shoulder.</p>
<p>The government is wrong. As the President’s Review Group on Intelligence and Communications Technologies <a href="http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf">affirmed</a>, such unchecked access to our records is too dangerous and too ripe for abuse. And as Review Group co-author Richard Clarke diplomatically put it later, NSLs are "<a href="http://www.onthemedia.org/story/nsa-gets-report-card/">a little difficult to square with constitutionality</a>."</p>
<p>We agree: NSLs must end. Whether that end comes through litigation or legislation, EFF looks forward to continue fighting NSLs in the new year.</p>
<p><em>This article is part of our 2013 Year in Review series; <a href="https://www.eff.org/deeplinks/2013/12/2013-review">read other articles</a> about the fight for digital rights in 2013.</em></p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/re-matter-2011-national-security-letter">In re: National Security Letter 2011 (11-2173)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=2013%20in%20Review%3A%20EFF%20Convinces%20Court%20to%20Declare%20National%20Security%20Letters%20Unconstitutional%20-%20President%27s%20Panel%20Agrees&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/12/2013-review-eff-convinces-court-declare-national-secruity-letters-unconstitutional&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=2013%20in%20Review%3A%20EFF%20Convinces%20Court%20to%20Declare%20National%20Security%20Letters%20Unconstitutional%20-%20President%27s%20Panel%20Agrees&amp;u=https%3A//www.eff.org/ar/deeplinks/2013/12/2013-review-eff-convinces-court-declare-national-secruity-letters-unconstitutional" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2013/12/2013-review-eff-convinces-court-declare-national-secruity-letters-unconstitutional" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=2013%20in%20Review%3A%20EFF%20Convinces%20Court%20to%20Declare%20National%20Security%20Letters%20Unconstitutional%20-%20President%27s%20Panel%20Agrees&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/12/2013-review-eff-convinces-court-declare-national-secruity-letters-unconstitutional" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Sun, 29 Dec 2013 15:14:32 +0000Matt Zimmerman78148 at https://www.eff.orgLegal AnalysisPrivacyNational Security LettersWe Can Hear You Now: Verizon Plans First Transparency Report (Update-AT&T, Too!)https://www.eff.org/ar/deeplinks/2013/12/we-can-hear-you-now-verizon-plans-first-transparency-report
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>We were pleasantly surprised by Verizon’s <a href="http://newscenter.verizon.com/corporate/news-articles/2013/12-19-verizon-to-publish-transparency-report/">announcement this week</a> that it will become the first major telecommunications company to release a transparency report. In early 2014, Verizon will follow in the footsteps of companies like Google, Facebook, and Apple, and will finally adopt this best practice and begin to tell its customers, and the American public, the details about how often law enforcement comes knocking with requests for user data. Verizon’s welcome announcement came the same day that Google updated its transparency report, which it has regularly released since 2010. Google's latest report details significant and <a href="http://www.google.com/transparencyreport/removals/government/?hl=en">troubling increases in government requests</a> to remove content from the Internet.</p>
<p>Verizon's announcement comes only after significant pressure. Last month, the telecom giant's shareholders <a href="http://www.nytimes.com/2013/11/21/technology/shareholders-pressure-att-and-verizon-wireless-over-surveillance-role.html">wrote a letter demanding the company</a> be more transparent about how it shares customer information with law enforcement and the government. But Verizon took a stance against its shareholders, claiming that the shareholders had no ground to demand the company take any action.</p>
<p>Now, one day after the White House Review Group on Intelligence and Communications Technologies <a href="https://www.eff.org/deeplinks/2013/12/eff-statement-presidents-review-groups-nsa-report">released its recommendations</a> for NSA reforms, Verizon appears to have <a href="http://www.techdirt.com/articles/20130917/17490324560/same-day-its-revealed-verizon-has-never-challenged-nsa-it-mocks-internet-companies-doing-so.shtml">made an about-face on comments</a> the company made earlier this year that mocked efforts by other tech companies to be more transparent. One Verizon executive called transparency efforts to be a bit of grandstanding, saying those companies merely, “waive their arms and protest loudly so as not to offend the sensibility of their customers.”</p>
<p>We welcome Verizon's change of heart. EFF has <a href="https://www.eff.org/deeplinks/2013/01/its-time-transparency-reports-become-new-normal">long </a>called on corporations to be transparent about what they do with the data that users entrust to them. Once the report is issued, Verizon will be the first telecom company to receive a star for transparency reporting in our next <a href="https://www.eff.org/who-has-your-back-2013">Who Has Your Back Report</a> for 2014, where we assess major Internet companies' commitment to standing by the rights of users in the face of government requests for personal information about their customers.</p>
<p>In 2014, we’ll be looking to the rest of the telecom industry to follow suit. AT&amp;T continues to refuse to publish a transparency report, despite <a href="http://bits.blogs.nytimes.com/2013/12/06/att-responds-to-shareholders-concerns-on-user-data/">receiving similar shareholder demands</a> to be more forthcoming about how the company shares the personal data of their customers with the government. In a <a href="http://graphics8.nytimes.com/packages/pdf/technology/ny-common-retirement-fund-sec-letter.pdf">letter to the Security and Exchange Commission</a>, AT&amp;T argued that public debate about mass surveillance has focused on the correctness of government actions, not on corporate actions. AT&amp;T is dead wrong; both <a href="https://www.eff.org/nsa-spying/timeline">AT&amp;T and Verizon were complicit in NSA spying</a>, even before the secret FISA court issued its first rubber-stamp order compelling them to do so.</p>
<p>Unfortunately, Verizon's transparency report will be stifled by the Justice Department's <a href="https://www.eff.org/deeplinks/2013/10/transparent-new-black">irrational and unconstitutional restrictions</a> on how transparent companies are allowed to be. With a mix of <a href="https://www.eff.org/issues/national-security-letters">gag orders</a> and <a href="https://www.eff.org/deeplinks/2013/03/new-statistics-about-national-security-letters-google-transparency-report">other burdensome restrictions</a>, companies are only allowed to disclose in very broad ranges the number of national security orders and the number of accounts affected.</p>
<p>“Verizon is working with the U.S. government regarding the detail the company can report on the number of National Security Letters it received last year,” the company's <a href="http://newscenter.verizon.com/corporate/news-articles/2013/12-19-verizon-to-publish-transparency-report/">announcement reads</a>. “Similar to transparency reports published by other major Internet companies, Verizon’s report will not disclose information about other national security requests received by the company.”</p>
<p>EFF whole-heartedly looks forward to reading Verizon's first transparency report when it's released, and we encourage the company to <a href="https://www.cdt.org/files/pdfs/weneedtoknow-transparency-bills-support-letter.pdf">join the fight against the government’s position that it must lie by the omission</a> of national security requests from the report. EFF strongly urges other telecommunications companies to adopt this industry standard best practice. With transparency reports, companies have the opportunity to deepen their consumers’ trust by being open about how governments around the world collect and use our private data. We hope Verizon’s first step will open the door to more wireless and broadband providers to begin regular transparency reporting.</p>
<p><strong>UPDATE:</strong> Moments after this post went live, AT&amp;T made its own about-face and <a href="http://www.prnewswire.com/news-releases/att-update-on-government-surveillance-position-236750591.html">announced that it too will release a transparency report</a> next year. While we welcome AT&amp;T’s announcement just as we welcomed Verizon’s, AT&amp;T has specifically noted that it will decline to push the Justice Department to publish even general numbers regarding intelligence agency requests. AT&amp;T’s failure to push for the right to fully and accurately inform the public about our government’s actions is extremely disappointing, and we urge AT&amp;T to reconsider its position.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=We%20Can%20Hear%20You%20Now%3A%20Verizon%20Plans%20First%20Transparency%20Report%20%28Update-AT%26T%2C%20Too%21%29&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/12/we-can-hear-you-now-verizon-plans-first-transparency-report&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=We%20Can%20Hear%20You%20Now%3A%20Verizon%20Plans%20First%20Transparency%20Report%20%28Update-AT%26T%2C%20Too%21%29&amp;u=https%3A//www.eff.org/ar/deeplinks/2013/12/we-can-hear-you-now-verizon-plans-first-transparency-report" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2013/12/we-can-hear-you-now-verizon-plans-first-transparency-report" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=We%20Can%20Hear%20You%20Now%3A%20Verizon%20Plans%20First%20Transparency%20Report%20%28Update-AT%26T%2C%20Too%21%29&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/12/we-can-hear-you-now-verizon-plans-first-transparency-report" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 20 Dec 2013 19:58:24 +0000April Glaser and Nate Cardozo78125 at https://www.eff.orgNational Security LettersNSA SpyingPATRIOT ActTransparencyEFF Argues for Release of Secret Legal Opinion on Surveillance Authority on Tuesdayhttps://www.eff.org/ar/press/releases/eff-argues-release-secret-legal-opinion-surveillance-authority-tuesday
<div class="field field-name-field-pr-subhead field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">DC Appeals Court to Hear FOIA Lawsuit Against the Department of Justice </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Washington, DC - Lawyers from the Electronic Frontier Foundation (EFF) will appear before the US Court of Appeals for the District of Columbia Circuit on Tuesday morning to argue for the release of a secret legal opinion on the federal government’s surveillance authority. For nearly three years, EFF has sought, under the Freedom of Information Act (FOIA), the disclosure of a document produced by the Office of Legal Counsel (OLC) that the FBI claims provides it with the authority to obtain private call-detail records in "certain circumstances," without any legal process or a qualifying emergency.</p>
<p><strong>Who:</strong> EFF Staff Attorney Mark Rumold, who will be delivering the oral argument, and EFF Senior Counsel David Sobel</p>
<p><strong>What:</strong> Oral argument in Electronic Frontier Foundation v. US Department of Justice (Case Number 12-5363)</p>
<p><strong>When:</strong> 9:30 am (EST), Tuesday, Nov. 26, 2013</p>
<p><strong>Where:</strong> Barrett Prettyman US Courthouse<br />
333 Constitution Ave., NW Washington, DC 20001.<br />
US Court of Appeals Courtroom - Judges Srinivasan, Edwards, &amp; Sentelle</p>
<p><strong>Media Availability:</strong> EFF attorneys will be available for comment immediately after the hearing at the courthouse.</p>
<p>In January 2010, the US Department of Justice's Office of the Inspector General released a report on the FBI's use of "exigent letters and other informal requests" to obtain telephone records from phone companies. The report described an OLC opinion that determined the federal government could obtain call records without legal process and without citing an emergency situation to justify the data collection. The OLC's determination appears to directly conflict with the Stored Communications Act, a federal privacy law that safeguards customer call records from disclosure to the government without valid legal process.</p>
<p>EFF submitted a FOIA request for the documents in February 2011, which the DOJ rejected. EFF filed its lawsuit in DC in May 2011 and appealed when the district court sided with government.</p>
<p>"The public has a fundamental right to know how the federal government is interpreting federal surveillance and privacy laws," Staff Attorney Mark Rumold said. "These interpretations affect wide swaths of society—the public, communications providers, and federal agencies—and the government cannot be allowed to shield its interpretations of law from public scrutiny. Secret surveillance law simply has no place in a democratic society."</p>
<h3>Contacts:</h3>
<p>Mark Rumold<br />
Staff Attorney<br />
Electronic Frontier Foundation<br /><a href="mailto:mark@eff.org">mark@eff.org</a></p>
<p>David Sobel<br />
Senior Counsel<br />
Electronic Frontier Foundation<br /><a href="mailto:sobel@eff.org">sobel@eff.org</a></p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=EFF%20Argues%20for%20Release%20of%20Secret%20Legal%20Opinion%20on%20Surveillance%20Authority%20on%20Tuesday&amp;url=https%3A//www.eff.org/ar/press/releases/eff-argues-release-secret-legal-opinion-surveillance-authority-tuesday&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=EFF%20Argues%20for%20Release%20of%20Secret%20Legal%20Opinion%20on%20Surveillance%20Authority%20on%20Tuesday&amp;u=https%3A//www.eff.org/ar/press/releases/eff-argues-release-secret-legal-opinion-surveillance-authority-tuesday" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/press/releases/eff-argues-release-secret-legal-opinion-surveillance-authority-tuesday" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=EFF%20Argues%20for%20Release%20of%20Secret%20Legal%20Opinion%20on%20Surveillance%20Authority%20on%20Tuesday&amp;url=https%3A//www.eff.org/ar/press/releases/eff-argues-release-secret-legal-opinion-surveillance-authority-tuesday" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Mon, 25 Nov 2013 18:58:27 +0000Dave Maass77709 at https://www.eff.orgApple Issues First Transparency Report, Includes "Warrant Canary"https://www.eff.org/ar/deeplinks/2013/11/apples-first-transparency-report-gets-warrant-canaries-right
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p dir="ltr">On Tuesday, yet another one of the nine companies originally implicated in the<a href="https://www.eff.org/deeplinks/2013/06/what-we-need-to-know-about-prism"> PRISM program</a> released<a href="//www.apple.com/pr/pdf/131105reportongovinforequests3.pdf"> its first transparency report</a>. Apple joins the ranks of Google,<a href="https://www.eff.org/deeplinks/2013/10/deeper-dive-into-facebook-and-yahoo-transparency-reports"> Yahoo, and Facebook</a>, among others that have issued reports that detail the number of requests the companies receive from governments for user data.</p>
<p dir="ltr">EFF has <a href="https://www.eff.org/deeplinks/2013/01/its-time-transparency-reports-become-new-normal">long </a>called on corporations to be transparent about what they do with the data that users entrust to them. Transparency reports have become the industry standard, and we are delighted to be able to award Apple another star in the 2014 edition of our annual<a href="https://www.eff.org/who-has-your-back-2013"> Who Has Your Back</a> campaign, where we assess major Internet companies' commitment to standing by the rights of users in the face of government requests for personal information about their customers.</p>
<p dir="ltr">This is Apple's first transparency report, and it only looks at the first half of 2013. The report includes information about which countries have asked for user data, the number of requests received and granted, the number of times Apple has objected to information requests, as well as the number of information requests where Apple has not disclosed data.</p>
<p dir="ltr">The U.S. is reported to have made the most requests. After the U.S., the top three countries requesting user information are the United Kingdom (127), Spain (102), and Germany (93).</p>
<p dir="ltr">In the report, Apple makes an important distinction between government requests for “data” and government requests for “content”. Apple defines data as “personal identifiers”, such as Apple IDs, email addresses, and telephone and credit card numbers. When Apple hands over user content, however, the company provides governments with more detailed information like iCloud emails, contacts, photos, and calendars.</p>
<p dir="ltr">Transparency reports are a voluntary tool used by companies to provide the public with information about government requests for user data. Despite their importance, the U.S. government makes it difficult for corporations to be as transparent as they might prefer to be about how their customers’ data is shared. With a mix of <a href="https://www.eff.org/issues/national-security-letters">gag orders</a> and <a href="https://www.eff.org/deeplinks/2013/03/new-statistics-about-national-security-letters-google-transparency-report">other burdensome restrictions</a>, companies are only allowed to disclose in very broad ranges the number of national security orders and the number of accounts affected. Apple notably opposes these gag orders and points out in its report that the company has and will continue to strongly advocate for these restrictions to be lifted.</p>
<p dir="ltr">We agree with Apple. In March of this year, months before the NSA spying revelations flooded the press, a<a href="https://www.eff.org/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute"> federal judge ruled</a> in favor of our client, an unnamed telecommunications company that challenged the FBI's ability to issue National Security Letters and gag companies from disclosing the fact that they are legally obligated to share their customers' data with the government. The judge found those gag orders and related restrictions to be in violation of the First Amendment.</p>
<p dir="ltr">Take a quick glance at Apple’s report and it becomes obvious just how stifling gag orders are. Apple lists that they received between 1000-2000 account information requests from the United States. As Apple explains, the U.S. government only allows companies to report a “consolidated range in increments of 1000” and further requires reporting on government requests to combine law enforcement and national security order requests. Apple graphs the 33 countries that have solicited their users' data; the U.S. is listed as having issued between 1000-2000 requests. Countries that have a poor track record of protecting human rights, including Russia, China, and the United Arab Emirates, have likewise made information requests that have been honored by Apple.</p>
<p dir="ltr">Except for the U.S., Apple lists exact numbers for all of the 33 other countries that have requested user data from the company. For example, the United Kingdom made 127 requests in the first six months of 2013. Providing this exact number allows users to more accurately grasp the scope of government surveillance.</p>
<p dir="ltr">Perhaps the most interesting part of the transparency report are the last two sentences: “Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us.”</p>
<p dir="ltr">Apple’s statement is an implementation of the so-called “<a href="https://en.wikipedia.org/wiki/Warrant_canary">warrant canary</a>.” Canaries are used to signal that, as of the date published, there have been no law enforcement requests of a particular type received. In Apple's case, the canary is limited to a signal that no secret <a href="https://www.eff.org/deeplinks/2013/06/confirmed-nsa-spying-millions-americans">Section 215</a> orders have been served on the company. If the canary is removed in the next transparency report, it is safe for users to assume that a Section 215 data request and the accompanying gag order has been issued. We appreciate Apple’s implementation in particular, including its six-month delay, because if its use is ever challenged in court, the ample time will allow a judge to coolly and calmly review the constitutionality of any government attempt to compel Apple to lie. We fear that if the first challenge to a warrant canary comes before a court in a more rushed context, a rushed judge could make bad law.</p>
<p dir="ltr">We applaud Apple's decision to release a transparency report, and hope that the company will continue to publish reports regularly. Every company that issues a transparency report brings us critical insight into how governments around the world use (and abuse) legal processes to collect our private data.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Apple%20Issues%20First%20Transparency%20Report%2C%20Includes%20%22Warrant%20Canary%22&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/11/apples-first-transparency-report-gets-warrant-canaries-right&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Apple%20Issues%20First%20Transparency%20Report%2C%20Includes%20%22Warrant%20Canary%22&amp;u=https%3A//www.eff.org/ar/deeplinks/2013/11/apples-first-transparency-report-gets-warrant-canaries-right" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2013/11/apples-first-transparency-report-gets-warrant-canaries-right" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Apple%20Issues%20First%20Transparency%20Report%2C%20Includes%20%22Warrant%20Canary%22&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/11/apples-first-transparency-report-gets-warrant-canaries-right" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 07 Nov 2013 17:10:44 +0000April Glaser76980 at https://www.eff.orgCommentaryPrivacyNational Security LettersNSA SpyingA Deeper Dive Into Yahoo and Facebook's Transparency Reportshttps://www.eff.org/ar/deeplinks/2013/10/deeper-dive-into-facebook-and-yahoo-transparency-reports
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Ever since Google issued its <a href="https://www.eff.org/deeplinks/2010/04/google-shows-government-information-and-takedown">first transparency report</a> in early 2010, EFF has <a href="https://www.eff.org/deeplinks/2013/01/its-time-transparency-reports-become-new-normal">called on other companies</a> to follow suit and disclose statistics about the number of government requests for user data, whether the request they receive is an official demand (such as a warrant) or an unofficial request. After all, users make decisions every day about which companies they trust with their data, therefore companies owe it to their customers to be transparent about when they hand data over to governments and law enforcement.</p>
<p>Since 2010, other companies have <a href="https://www.eff.org/who-has-your-back-2013">risen to the challenge</a>, including <a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/">Microsoft</a>, Internet service provider <a href="http://corp.sonic.net/ceo/2012/04/13/transparency-report/">Sonic.Net</a>, cloud storage providers <a href="https://spideroak.com/blog/20130404171036-increasing-transparency-alongside-privacy-2013-report">SpiderOak</a> and <a href="https://www.dropbox.com/transparency">DropBox</a>, as well as social media companies such as <a href="http://help.linkedin.com/app/answers/detail/a_id/41878">LinkedIn</a> and <a href="https://transparency.twitter.com/">Twitter</a>.</p>
<p>Now, two more companies have joined the movement: In the past couple of months, both <a href="http://info.yahoo.com/transparency-report/government-data-requests">Yahoo</a> and <a href="https://www.facebook.com/about/government_requests">Facebook</a> issued their first transparency reports, covering the period of January-June 2013.</p>
<p>While we wish they had not taken this long, the two companies deserve kudos for taking this important step. Companies are under no legal obligation to inform their customers about government requests for their data—this is a voluntary step. Both companies are members of the <a href="http://globalnetworkinitiative.org/principles/index.php">Global Network Initiative</a>, however, which counts transparency among its core principles.</p>
<p><b>User trust</b></p>
<p>But in light of this summer’s revelations about the NSA’s <a href="http://www.salon.com/2013/06/09/can_you_use_the_internet_without_prism_partner/">PRISM</a>—the program under which the NSA gains the ability to access to the private communications of users of many of the most popular Internet services, including those owned by Google, Microsoft, Facebook, and Yahoo—Internet giants are rushing to do what they can to restore user trust.</p>
<p>In September, Google, Facebook, and Yahoo all filed requests to the U.S. Foreign Intelligence Surveillance Court (FISC), asking for permission to publish the specific number of <a href="https://www.eff.org/issues/national-security-letters">National Security Letters</a> (NSL) that the companies received in the past year as well as the total number of user accounts affected by those requests. Of all the dangerous government surveillance powers that were expanded by the <a href="https://en.wikipedia.org/wiki/Patriot_Act">USA PATRIOT Act</a>, the NSL power provided by <a href="https://www.fas.org/sgp/crs/intel/RL33320.pdf">five statutory provisions</a> is one of the most frightening and invasive. These letters—the type served on communications service providers such as phone companies and ISPs and are authorized by <a href="http://www.law.cornell.edu/uscode/text/18/2709">18 U.S.C. 2709</a>—allow the FBI to secretly demand data about ordinary American citizens' private communications and Internet activity without any prior judicial review. To make matters worse, recipients of NSLs are subject to gag orders that forbid them from ever revealing the letters' existence to anyone. A federal judge found NSLs <a href="https://www.eff.org/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules">unconstitutional</a> in March, but the order is on hold pending the government's appeal.</p>
<p>Some companies have published aggregate numbers, ranging from 0-999 or 1000-1999 that give us a broad and blurry view of just how widespread the use of NSLs has been, but more detailed numbers would much more helpful to the public understanding of the surveillence, without compromising security.</p>
<p><b>So now that Facebook and Yahoo have issued transparency reports, what do they tell us?</b></p>
<p>Facebook’s <a href="https://www.facebook.com/about/government_requests">Global Government Requests Report</a> covers January-June 2013 and reveals that 71 countries requested data on a total of 37,954 to 38,954 users. Unsurprisingly, the US demanded the largest amount of user data, making somewhere between 11,000 to 12,000 requests for 20,000 to 21,000 users.</p>
<p>India came in a close second, with 3,245 requests for 4,144 accounts, and the United Kingdom ranked third with 1,975 requests for 2,337 users. Facebook also revealed the number of times the requests produced "some data." Facebook handed over data to the U.S. 79% of the time, but only 50% and 68% of the time for India and the United Kingdom, respectively.</p>
<p>The vast majority of requests made to Facebook by less democratic countries (including Cote d’Ivoire, Nepal, and Qatar) were refused, however two nations stood out in the report: Pakistan and Turkey. In the case of Pakistan, 35 requests were made for 47 users, 77% of which Facebook complied with. In the case of Turkey, 96 requests for 170 users were made, and complied with 47% of the time.</p>
<p>What makes this unique is that no other major company has reported compliance with requests from Pakistan. The South Asian country is nominally a democracy, but censors the Internet heavily and has made a <a href="https://www.eff.org/deeplinks/2012/02/not-a-hoax-pakistan-requests-proposals-national-filtering-and-blocking-system">relatively transparent effort</a> of seeking Western companies to enable greater censorship and surveillance, a role that Canadian company <a href="http://bolobhi.org/canadian-government-responds-netsweeper-pakistan/">Netsweeper</a> has been all too eager to fill. It is notable that Facebook has no offices in Pakistan (an office in-country could allow Pakistan to directly seek information from a local employee), nor has Pakistan signed a mutual legal assistance treaty (MLAT) with the US, putting Facebook under no legal obligation to comply with requests from the government. </p>
<p>With no offices in Turkey, either, it’s surprising to see such a high rate of compliance. Complaints of Facebook censoring certain content in Turkey abound, and as a recent blog post by a Kurdish activist <a href="http://hevallo.blogspot.co.uk/2013/09/more-details-about-our-facebook-meeting.html">demonstrates</a>, some of that censorship seems quite arbitrary. </p>
<p>At the same time, if Facebook doesn’t comply, it undoubtedly risks being blocked in these countries, just as YouTube was for several years, and a tool used by opposition figures and activists might become unavailable. On balance, we think most countries would rightly be hesitant to remove popular Internet tool, as it may create more unrest than the information sought to be quashed. </p>
<p>While Facebook has been transparent about its <a href="https://www.facebook.com/safety/groups/law/guidelines/">law enforcement guidelines</a>, information regarding its processes when it comes to international requests is vague - the data use policy allows disclosure when "consistent with internationally recognized standards," which are not defined. Facebook could enhance its transparency by clarifying its standards for complying with requests; even if its standards are perfect in every way, users are legitimately concerned when they do not know what standards might apply.</p>
<p>Like Facebook, Yahoo also reported that the United States led the number of requests, with 12,444 data requests that included 40,322 Yahoo accounts. Yahoo handed content-related data, including communications in Yahoo Mail or Messenger, photos on Flickr or Yahoo Address Book entries, over to American agencies in 4,604 cases. The company gave the government non-content related information, which includes a person’s name, location or Internet Protocol address, in 6,798 cases.</p>
<p>Yahoo received fewer requests from the United Kingdom (1,709) and India (1,490) than did Facebook, with similar compliance rates. Once nice feature of Yahoo’s report is that it breaks down the type of data disclosure (non-content vs. content) in a pie chart for each country. In the UK, for example, 44% of requests were responded to with disclosures of non-content data, while in 20% of cases, content was disclosed to law enforcement.</p>
<p>Surprisingly, Yahoo received <a href="http://info.yahoo.com/transparency-report/hk/">far more requests</a> from Hong Kong than any other company, and complied with 100% of them (content was only disclosed in 1% of those cases). The South China Morning Post <a href="http://www.scmp.com/news/hong-kong/article/1305928/yahoo-complied-requests-data-800-plus-hong-kong-users">quoted</a> lawmaker Charles Mok as saying that the number was high, and called on Yahoo to disclose which government agencies requested the data.</p>
<p> </p>
<div>
<div>
<div></div>
</div>
</div>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=A%20Deeper%20Dive%20Into%20Yahoo%20and%20Facebook%27s%20Transparency%20Reports&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/10/deeper-dive-into-facebook-and-yahoo-transparency-reports&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=A%20Deeper%20Dive%20Into%20Yahoo%20and%20Facebook%27s%20Transparency%20Reports&amp;u=https%3A//www.eff.org/ar/deeplinks/2013/10/deeper-dive-into-facebook-and-yahoo-transparency-reports" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2013/10/deeper-dive-into-facebook-and-yahoo-transparency-reports" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=A%20Deeper%20Dive%20Into%20Yahoo%20and%20Facebook%27s%20Transparency%20Reports&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/10/deeper-dive-into-facebook-and-yahoo-transparency-reports" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 25 Oct 2013 14:01:40 +0000Eva Galperin and Jillian York76618 at https://www.eff.orgInternationalPrivacyNational Security LettersNSA SpyingTransparencyLinkedIn Fights In Court For Surveillance Transparency on Multiple Frontshttps://www.eff.org/ar/deeplinks/2013/09/linkedin-commendably-fights-surveillance-transparency-court-multiple-fronts
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>In a welcome and commendable move, LinkedIn, the business social networking giant, <a href="http://blog.linkedin.com/2013/09/17/linkedins-commitment-to-transparency-about-government-requests-for-member-data/?utm_content=sf17313390&amp;utm_medium=spredfast&amp;utm_source=linkedin&amp;utm_campaign=LinkedIn+Social&amp;sf17313390=1">has filed an amicus brief</a> in EFF’s landmark case challenging the statute governing National Security Letters (NSLs) as an unconstitutional prohibition of free speech (read the <a href="http://press.linkedin.com/download-media/423">full brief here</a>). LinkedIn has also filed a motion with the FISA court arguing it’s their First Amendment right to publish how many users are affected by FISA court orders, which have been at the center of the NSA scandal.</p>
<p>In a historic decision this March, a California district court judge <a href="https://www.eff.org/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute">struck down a National Security Letter statutes</a> on the basis that its broad gag orders prohibiting companies from even acknowledging they received an NSL violated the First Amendment. The decision is now up on appeal in the Ninth Circuit and LinkedIn has filed its brief in support of EFF’s unnamed client.</p>
<p>We applaud LinkedIn’s push for more transparency surrounding both NSLs and FISA court orders, which are both under renewed scrutiny since <em>The Guardian</em> and <em>Washington Post</em> started publishing revelations based on documents given to them by NSA whistleblower Edward Snowden in June.</p>
<p>One of EFF’s core arguments on behalf of our gagged client—echoed by LinkedIn in its amicus brief—is simple: Americans have the right to know how pervasive the FBI’s use of this largely unchecked power has become. Since the first national security letter statute was passed in 1986, the FBI has issued hundreds of thousands of such letters seeking private telecommunications and financial records of Americans without any court approval whatsoever. The broad gag orders prevent recipients from even being able to acknowledge receipt of one—making them ripe for abuse—and the FBI has, on multiple occasions, been excoriated by government watchdogs for exceeding their powers.</p>
<p>Like other companies such as Google and Microsoft, LinkedIn has been trying to negotiate with the government about a way to tell the public how many people are affected by these orders. The government has refused to budge, sticking to its insufficient offers to permit publication of vague '0-999' ranges, attempting to defuse the crisis without giving enough data for an informed debate. These proposed compromises fail to solve the clear First Amendment problems created by the NSL surveillance regime.</p>
<p>LinkedIn’s legal briefs are an extension of <a href="http://www.csmonitor.com/Innovation/2013/0718/Internet-companies-call-for-greater-transparency-from-secret-court">a July 18, 2013 letter</a> that dozens of companies, nonprofit organizations, and trade associations sent a letter to President Obama and Congress urging greater transparency around national security-related requests from the US government. We hope other companies will follow LinkedIn’s lead and join in the legal fight. We also hope that other companies who are already pushing back against suspect surveillance authorities, but who are doing so in secret because of gag orders, will keep up their efforts.</p>
<p>These gag orders violate the free speech of their company, but also the trust of their users. In their legal brief, LinkedIn makes the point that even the US government has emphasized that being able to explain privacy protections to users is a key building users' trust. As the Internet Policy Task Force of the Department of Commerce noted in a report:</p>
<blockquote><p>Privacy protections are crucial to maintaining consumer trust, which is necessary to secure full use of the Internet as a political, educational, cultural, and social medium. Trust—the belief that someone or something will behave as expected, and not another way—is of central importance to the Internet.</p></blockquote>
<p>We couldn’t agree more and we hope the Ninth Circuit and FISA court do too.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=LinkedIn%20Fights%20In%20Court%20For%20Surveillance%20Transparency%20on%20Multiple%20Fronts&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/09/linkedin-commendably-fights-surveillance-transparency-court-multiple-fronts&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=LinkedIn%20Fights%20In%20Court%20For%20Surveillance%20Transparency%20on%20Multiple%20Fronts&amp;u=https%3A//www.eff.org/ar/deeplinks/2013/09/linkedin-commendably-fights-surveillance-transparency-court-multiple-fronts" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2013/09/linkedin-commendably-fights-surveillance-transparency-court-multiple-fronts" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=LinkedIn%20Fights%20In%20Court%20For%20Surveillance%20Transparency%20on%20Multiple%20Fronts&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/09/linkedin-commendably-fights-surveillance-transparency-court-multiple-fronts" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 18 Sep 2013 19:28:30 +0000Trevor Timm75728 at https://www.eff.orgFree SpeechNational Security LettersNSA SpyingTransparencyPresident Foreshadows New Internet Surveillance Proposal During National Security Speechhttps://www.eff.org/ar/deeplinks/2013/05/president-hints-new-surveillance-powers-during-speech-tell-white-house-protect
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><img src="https://www.eff.org/files/images_insert/calea2-square_0.jpg" width="265" height="265" alt="" class="image-right" />President Obama <a href="http://www.npr.org/2013/05/23/186305171/transcript-obama-addresses-counterterrorism-drones">gave an influential speech</a> on counter terrorism and national security policy last week, and while much of the media coverage discussed the President remarks on Guantanamo prison and drone strikes, buried in the speech was a line just as critical to civil liberties online.</p>
<p>Half way through <a href="http://www.whitehouse.gov/the-press-office/2013/05/23/remarks-president-barack-obama">the speech</a>, Obama said he wanted to “review[] the authorities of law enforcement, so we can intercept new types of communication, and build in privacy protections to prevent abuse.”</p>
<p>We certainly agree with the president we need new privacy protections for our digital communications, and it’s encouraging to hear him suggest support for such proposals. After all, we know the vast surveillance authorities given to law enforcement over the last decade’—like the <a href="https://www.eff.org/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act">Patriot Act</a>, <a href="https://www.eff.org/deeplinks/2012/12/congress-disgracefully-approves-fisa-warrantless-eavesdropping-bill-five-more">FISA Amendments Act</a>, and <a href="https://www.eff.org/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules">National Security Letters</a>—have been serially abused. Unfortunately, President Obama has actively defended these laws and policies in Congress and the courts, despite promising to reform them as a candidate.</p>
<p>There are still many measures his administration could support in the coming months to protect Americans communications. The White House could formally support <a href="https://www.eff.org/deeplinks/2013/05/update-email-privacy-law-must-go-further">reform of the Electronic Communications Privacy Act</a>, which still says law enforcement agencies do not need warrants to obtain emails over 180 days old. The White House could come out in favor of warrant protection for cell-phone location information since it’s requested by authorities <a href="https://www.eff.org/deeplinks/2012/07/law-enforcement-agencies-demanded-cell-phone-user-info-much-more-13-million-times">literally millions of times a year</a> without a warrant. In the wake of the Associated Press scandal, Obama could also support a bill to <a href="https://www.eff.org/deeplinks/2013/05/5-overlooked-lessons-justice-depts-leak-investigations">require a court order</a> for call records of all Americans.</p>
<p>But the first half of Obama’s statement—about “review[] the authorities of law enforcement, so we can intercept new types of communication”—is quite troubling. The line is likely an allusion to CALEA II, a <a href="https://www.eff.org/deeplinks/2013/05/caleatwo">dangerous</a> proposal the <i>New York Times</i> has reported the administration “is on the verge of backing.” The measure would force companies like Google and Facebook to install backdoors in all of their products to facilitate law-enforcement access, putting both our privacy and security at risk. </p>
<p>Law enforcement certainly doesn’t need more legal authorities to conduct digital surveillance. As mentioned above, Congress has already been provided a huge amount of new surveillance authority that has been abused.<b> </b>As former White House Chief Counselor for Privacy <a href="http://www.peterswire.net/psresumebio.htm">Peter Swire</a> said in 2011, "<a href="https://www.cdt.org/blogs/2811going-dark-versus-golden-age-surveillance">today [is] a golden age for surveillance</a>."</p>
<p>Indeed, it seems that the law enforcement is working at cross-purposes with the folks concerned about actual cybersecurity. Just a few months ago in his State of the Union address, Obama himself <a href="http://www.securityorb.com/2013/02/president-obamas-state-union-cybersecurity-text/">talked about</a> hackers who steal people’s identities and infiltrate private e-mail” and “foreign countries and companies [that] swipe our corporate secrets.” Requiring real-time back doors into all of our communications would make those kinds of attacks easier. Recently, a group of more than a dozen of <a href="https://www.cdt.org/blogs/joseph-lorenzo-hall/1705leading-security-experts-say-fbi-wiretapping-proposal-would-undermine-">the nation’s best cybersecurity experts published a paper</a> explaining why such a proposal would be a disaster for Internet security, giving hackers all over the world a central point of vulnerability to target.</p>
<p>And of course the FBI has still failed to put forth any evidence showing a bill to “intercept new kinds of communications” is needed at all. According to government statistics, from 2006-2010, the FBI has been ultimately thwarted by encryption <b>zero </b>times in their criminal investigations.</p>
<p>Citing privacy concerns, the White House <a href="http://mashable.com/2013/04/16/white-house-veto-cispa/">commendably has threatened to veto CISPA</a>, the cybersecurity bill. It should also jettison this ill-conceived CALEA II proposal in favor of privacy <i>and </i>security.</p>
<p><a href="https://action.eff.org/o/9042/p/dia/action3/common/public/?action_KEY=9252">Email and call the White House today</a> to tell them you oppose any plan to make Internet companies build government backdoors into your communications.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=President%20Foreshadows%20New%20Internet%20Surveillance%20Proposal%20During%20National%20Security%20Speech&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/05/president-hints-new-surveillance-powers-during-speech-tell-white-house-protect&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=President%20Foreshadows%20New%20Internet%20Surveillance%20Proposal%20During%20National%20Security%20Speech&amp;u=https%3A//www.eff.org/ar/deeplinks/2013/05/president-hints-new-surveillance-powers-during-speech-tell-white-house-protect" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2013/05/president-hints-new-surveillance-powers-during-speech-tell-white-house-protect" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=President%20Foreshadows%20New%20Internet%20Surveillance%20Proposal%20During%20National%20Security%20Speech&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/05/president-hints-new-surveillance-powers-during-speech-tell-white-house-protect" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 30 May 2013 20:35:23 +0000Trevor Timm74385 at https://www.eff.orgCell TrackingLocational PrivacyNational Security LettersNSA SpyingPATRIOT ActTransparencyIn Depth: The District Court's Remarkable Order Striking Down the NSL Statutehttps://www.eff.org/ar/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>On Friday, EFF received the long-awaiting ruling on its <a href="https://www.eff.org/deeplinks/2012/07/eff-challenges-national-security-letter-statute-landmark-lawsuit">2011 petition</a> to set aside a National Security Letter (NSL) issued to a telecommunications company. The petition challenged the constitutionality of one of five national security letter statutes, <a href="http://www.law.cornell.edu/uscode/text/18/2709">18 U.S.C. § 2709</a>. And what a ruling it was. In a <a href="https://www.eff.org/files/filenode/nsl_order_scan.pdf">detailed and careful 24-page opinion</a>, Judge Susan Illston of the district court for the Northern District of California methodically addressed the government's attempted justifications for this controversial domestic surveillance tool and found that the statute failed to meet the standards of settled First Amendment law.</p>
<p>First, a moment to underscore the importance of this ruling. Over the past decade, since the PATRIOT Act expanded its reach from foreign agents and spies to anyone whose information may be "relevant" to a national security investigation, the FBI has issued hundreds of thousands of NSLs seeking potentially intimate information about Americans. Supporters of NSLs have frequently attempted to discount privacy concerns and have characterized criticism as "<a href="http://www.abajournal.com/magazine/article/national_security_letters_building_blocks_for_investigations_or_intrusive_t"></a><a href="http://www.abajournal.com/magazine/article/national_security_letters_building_blocks_for_investigations_or_intrusive_t/">hyperbole</a>," but the reality is very different. As Judge Victor Marrero of the Southern District of New York noted in his 2004 <em><a href="http://www.aclu.org/FilesPDFs/nsl_decision.pdf">Doe v. Ashcroft</a></em> NSL decision, the NSL statute grants enormous, unchecked power to pry into the private lives of people within the United States:</p>
<blockquote><p>The FBI theoretically could issue to a political campaign's computer systems operator a § 2709 NSL compelling production of the names of all persons who have email addresses through the campaign's computer systems. The FBI theoretically could also issue an NSL under § 2709 to discern the identity of someone whose anonymous online web log, or “blog,” is critical of the Government.</p></blockquote>
<p>Any statutory structure that grants the executive branch such power and couples that power with the ability to hide its behavior from scrutiny is ripe for abuse. And as we know, based on a <a href="https://www.eff.org/wp/patterns-misconduct-fbi-intelligence-violations">series of internal investigations ordered by Congress</a>, this abuse has occurred with NSLs.</p>
<p>With Friday's opinion, entitled <em>In Re National Security Letter</em>, not only did the court set aside <em>this</em> particular letter, it barred <em>any</em> NSLs to telecommunications providers, finding that the statute was so inherently flawed that it could not stand. The decision will likely be appealed, and the order has been stayed in order to give the government the time to file an appeal, but the federal district court deserves enormous credit for not shying away from EFF's request and instead tackling most of the difficult issues head on.</p>
<p>With this case, EFF follows in the strong footsteps of our friends at the ACLU. In 2008, on behalf of <a href="http://www.aclu.org/national-security/doe-v-holder">Nicholas Merrill</a>, the ACLU succeeded in convincing both a district court and the Second Circuit Court of Appeals to acknowledge the serious structural problems with the NSL statute. Unfortunately, despite finding the statute unconstitutional, the Second Circuit in its <a href="http://www.aclu.org/pdfs/safefree/doevmukasey_decision.pdf"><em>Doe v. Mukasey</em></a> opinion approved the continued use of NSLs if the FBI undertook certain voluntary measures aimed at curbing abuse.</p>
<p>The district court here found similar constitutional flaws but took those problems to their rightful conclusion. The court flatly rejected the Second Circuit's attempts to rewrite the statute and rely on voluntary FBI actions to fix it, instead striking it down. While the decision rested primarily on failings with the gag provision, the court ruled that that provision was not severable from the rest of the statute and struck the statute in its entirety. As a result, if the decision is upheld, Congress must step in and repair the structural defects to better protect First Amendment rights if it intends to continue to grant similar power to the FBI.</p>
<p>The court made five critical findings. First, Judge Illston quickly rejected the government's dangerous argument that NSL recipients had no power to review the constitutionality of the statute. The government had suggested that the court could only review specific problems with specific NSLs, meaning that larger structural problems with the statute would remain untouched. As the court correctly noted, however, the statute specifically allows a court to determine whether an NSL is "unreasonable" or "unlawful" which includes determining whether the statute itself is unconstitutional.</p>
<p>Second, the district court found that the statute impermissibly authorizes the FBI to limit speech without constitutionally-mandated procedural protections. The Supreme Court articulated the scope for such protections in 1965 in <em><a href="http://scholar.google.com/scholar_case?case=5133094020488688451&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr">Freedman vs. Maryland</a>,</em> a case in which it struck down a Maryland licensing scheme that required films to be submitted to a government ratings board prior to public showings. The problem with the statute wasn't necessarily its substantive reach as it was possible that films could be banned without violating the First Amendment -- if, for example, they met the First Amendment definition of "obscene." Instead, the court was concerned that the procedures for challenging a ban stacked the deck against theater owners. As the <em>Freedman</em> Court said at the time:</p>
<blockquote><p>Because the censor's business is to censor, there inheres the danger that he may well be less responsive than a court -- part of an independent branch of government -- to the constitutionally protected interests in free expression. And if it is made unduly onerous, by reason of delay or otherwise, to seek judicial review, the censor's determination may in practice be final.</p></blockquote>
<p>Accordingly, where speech is conditioned on first obtaining permission from the government, a statute must be designed to ensure that any person who is gagged gets a quick, fair opportunity to challenge that decision. Specifically, the <em>Freedman</em> Court required that:</p>
<ol><li>the burden must fall on the government to go to court to obtain approval for any gag</li>
<li>any pre-review gag must be strictly limited in time, and</li>
<li>the time in which a reviewing court must make its determination must be set to "short fixed period compatible with sound judicial resolution."</li>
</ol><p>The NSL statute plainly fails the <em>Freedman</em> test: the FBI can gag an NSL recipient on its own and without any judicial review, the statute does not force the government to initiate the review in the event that a recipient objects, and there are no requirements that a challenge be promptly heard or evaluated. Just as in the <em>Freedman</em> case, the district court here noted that the FBI was inclined to gag NSL recipients and the statute improperly stacked the deck against NSL recipients if they chose to challenge the gag.</p>
<p>Third, the court here also found that the statute must meet and failed to meet the exacting "strict scrutiny" standard required of statutes that restrict speech based on their content. Strict scrutiny requires that the government's gag be "narrowly tailored" to meet its needs, but the court held that even if the government's motivations were sound, it prohibited speech too broadly to meet those goals:</p>
<blockquote><p>The problem … is that the statute does nothing to account for the fact that when no such national security concerns exist, thousands of recipients of NSLs are nonetheless prohibited from speaking out about the mere fact of their receipt of an NSL, rendering the statute impermissibly over broad and not narrowly tailored.</p></blockquote>
<p>The court also noted that the statute was overly broad in that it authorized gags of indefinite length, regardless of any actual specific need over time.</p>
<p>Fourth, the district court found that the statute was not "severable," meaning that Congress designed the NSL tool as a whole and that the powers it granted to the FBI were not intended to function separately if one of the powers was found to be unconstitutional. Because the nondisclosure provision was found to be unconstitutional on its face, the power to compel the disclosure of customer records must also fall. NSL statistics are consistent with this observation: <a href="http://www.justice.gov/oig/testimony/t0909.pdf">97% of all NSLs are delivered with a gag order</a>.</p>
<p>Finally, the district court found that, regardless of other failings, the statute's standard of review violated separation of powers principles by forcing the courts to defer to the FBI's determinations and preventing independent review. It noted that a "[c]ourt can only sustain nondisclosure based on a searching standard of review." While courts do largely defer to the executive branch's judgment in national security matters, the standard in this statute required the court to consider the government's decision "conclusive" and only allowing the court to consider whether it was made in "bad faith." The court rightly noted that real judicial review requires more. </p>
<p>The court did not adopt all of EFF's arguments. Under the Supreme Court's <a href="https://en.wikipedia.org/wiki/Plurality_opinion">plurality</a> holding in <em><a href="http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl?court=us&amp;vol=403&amp;invol=713">New York Times v. United States</a></em> -- the famous "Pentagon Papers" case -- prior restraints in the national security context may only be justified if the disclosure of certain information "will surely result indirect, immediate, and irreparable harm to our Nation or its people," demonstrated by a showing of specific evidence to a court. EFF noted that the NSL statute permits the imposition of gags if the FBI certifies on its own that disclosure "may" result in some unspecified "harm" to a law enforcement investigation, a standard far below that of the Pentagon Papers case. Concluding that the prior restraint imposed by the NSL statute did not amount to a "classic" prior restraint, however, Judge Illston held that such standards would be "extraordinarily rigorous" and "too exacting."</p>
<p>The district court also did not address EFF's argument that the statute granted too much unbounded discretion to the FBI. Even if discretion is properly vested in a government agency to make certain evaluations, that evaluation must be constrained by "narrow, objective, and definite standards" so that the court can evaluate whether an agency like the FBI exceeds its authority. Once again, the NSL statute authorizes the FBI to gag NSL recipients whenever, in its view, a disclosure “may” result in a harm to national security or interfere with a criminal investigation. This language is subjective and sweeping, giving a court no practical ability to evaluate whether the FBI is properly exercising -- or exceeding -- its authority. As the court struck down the nondisclosure provision on other grounds, it did not reach this separate ground.</p>
<p>Finally, Judge Illston also declined to address another critical flaw argued by EFF: that the ability to obtain without court supervision the subscriber records of telecommunications customers -- such as an unidentified Internet poster's identity or a known individual's "calling circle" -- potentially violated the First Amendment rights to anonymous speech and association of subscribers. Without court approval ahead of time, victims of FBI overreach could never be made whole since the privacy rights at stake could never be reconstructed. However, Judge Illston struck down the records provision on severability grounds because of the fatal wound imposed by the unconstitutional gag provision instead of addressing the matter directly. </p>
<p>The <em>In Re National Security Letter</em> order is a major victory, first for EFF's anonymous client who we congratulate for its courage, sense of civic responsibility, and determination to stand up for the privacy rights of its customers. While many people have identified the unfairness and injustice of the NSL statute, exceedingly few demonstrated the courage to stand up and take on the power of the national security apparatus of the United States government. Indeed, as we have <a href="https://www.eff.org/deeplinks/2012/07/eff-challenges-national-security-letter-statute-landmark-lawsuit">previously reported</a>, the government shockingly responded to EFF's challenge by <a href="https://www.eff.org/files/filenode/complaint-redacted.pdf">suing our client</a>, claiming that by "stat[ing] its objection to compliance with the provisions of" the NSL by "exercis[ing] its rights under" the NSL statute to challenge the NSL's legality, EFF's client was "interfer[ing] with the United States' vindication of its sovereign interests in law enforcement, counterintelligence, and protecting national security."</p>
<p>Of course while this decision is a major victory, it is likely also a preliminary one. Because of the stay of the ruling, our client <em>still</em> cannot identify itself and participate more fully in the public debate about NSLs. EFF is gearing up for the likely appeal to the Ninth Circuit Court of Appeals and, possibly, to the Supreme Court. But that shouldn't stop us from taking a moment to celebrate and to remember that over-reaching national security powers can be challenged and challenged successfully.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/re-matter-2011-national-security-letter">In re: National Security Letter 2011 (11-2173)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=In%20Depth%3A%20The%20District%20Court%27s%20Remarkable%20Order%20Striking%20Down%20the%20NSL%20Statute&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=In%20Depth%3A%20The%20District%20Court%27s%20Remarkable%20Order%20Striking%20Down%20the%20NSL%20Statute&amp;u=https%3A//www.eff.org/ar/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=In%20Depth%3A%20The%20District%20Court%27s%20Remarkable%20Order%20Striking%20Down%20the%20NSL%20Statute&amp;url=https%3A//www.eff.org/ar/deeplinks/2013/03/depth-judge-illstons-remarkable-order-striking-down-nsl-statute" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Mon, 18 Mar 2013 19:07:33 +0000Matt Zimmerman73555 at https://www.eff.orgLegal AnalysisFree SpeechPrivacyNational Security LettersNational Security Letters Are Unconstitutional, Federal Judge Ruleshttps://www.eff.org/ar/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules
<div class="field field-name-field-pr-subhead field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Court Finds NSL Statutes Violate First Amendment and Separation of Powers</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>San Francisco - A federal district court judge in San Francisco has ruled that National Security Letter (NSL) provisions in federal law violate the Constitution. The decision came in a lawsuit challenging a NSL on behalf of an unnamed telecommunications company represented by the Electronic Frontier Foundation (EFF).</p>
<p>In the ruling publicly released today, Judge Susan Illston ordered that the Federal Bureau of Investigation (FBI) stop issuing NSLs and cease enforcing the gag provision in this or any other case. The landmark ruling is stayed for 90 days to allow the government to appeal.</p>
<p>"We are very pleased that the court recognized the fatal constitutional shortcomings of the NSL statute," said EFF Senior Staff Attorney Matt Zimmerman. "The government's gags have truncated the public debate on these controversial surveillance tools. Our client looks forward to the day when it can publicly discuss its experience."</p>
<p><img src="https://www.eff.org/files/nsl_team.jpg" align="middle" width="475px" /></p>
<p><em>EFF's NSL legal team. From left: Mark Rumold, Kurt Opsahl, Cindy Cohn, Matt Zimmerman and Nate Cardozo. </em></p>
<p>The controversial NSL provisions EFF challenged on behalf of the unnamed client allow the FBI to issue administrative letters -- on its own authority and without court approval -- to telecommunications companies demanding information about their customers. The controversial provisions also permit the FBI to permanently gag service providers from revealing anything about the NSLs, including the fact that a demand was made, which prevents providers from notifying either their customers or the public. The limited judicial review provisions essentially write the courts out of the process.</p>
<p>In today's ruling, the court held that the gag order provisions of the statute violate the First Amendment and that the review procedures violate separation of powers. Because those provisions were not separable from the rest of the statute, the court declared the entire statute unconstitutional. In addressing the concerns of the service provider, the court noted: "Petitioner was adamant about its desire to speak publicly about the fact that it received the NSL at issue to further inform the ongoing public debate."</p>
<p>"The First Amendment prevents the government from silencing people and stopping them from criticizing its use of executive surveillance power," said EFF Legal Director Cindy Cohn. "The NSL statute has long been a concern of many Americans, and this small step should help restore balance between liberty and security."</p>
<p>EFF first brought this challenge on behalf of its client in May of 2011.</p>
<p>For the full order:<br /><a href="https://www.eff.org/document/nsl-ruling-march-14-2013">https://www.eff.org/document/nsl-ruling-march-14-2013</a></p>
<p>For more on this case:<br /><a href="https://www.eff.org/cases/re-matter-2011-national-security-letter">https://www.eff.org/cases/re-matter-2011-national-security-letter</a></p>
<p>Contacts:</p>
<p>Matt Zimmerman<br />
Senior Staff Attorney<br />
Electronic Frontier Foundation<br />
mattz@eff.org</p>
<p>Cindy Cohn<br />
Legal Director<br />
Electronic Frontier Foundation<br />
cindy@eff.org</p>
<p>Kurt Opsahl<br />
Senior Staff Attorney<br />
Electronic Frontier Foundation<br />
kurt@eff.org</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=National%20Security%20Letters%20Are%20Unconstitutional%2C%20Federal%20Judge%20Rules&amp;url=https%3A//www.eff.org/ar/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=National%20Security%20Letters%20Are%20Unconstitutional%2C%20Federal%20Judge%20Rules&amp;u=https%3A//www.eff.org/ar/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=National%20Security%20Letters%20Are%20Unconstitutional%2C%20Federal%20Judge%20Rules&amp;url=https%3A//www.eff.org/ar/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 15 Mar 2013 21:27:24 +0000Rebecca Jeschke73526 at https://www.eff.orgProponents of Canada’s Online Spying Bill Still Trying to Justify Excessive Powershttps://www.eff.org/ar/deeplinks/2012/07/proponents-canada-online-spying-bill-still-trying-justify-excessive-powers
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Canada’s online surveillance bill may be <a href="https://www.eff.org/deeplinks/2012/02/keep-pressure-canadian-online-surveillance-bill-pause-fight-continues">on hold</a> for now, but a recent <a href="http://www.cbc.ca/news/canada/story/2012/07/13/pol-cp-csis-online-surveillance-fadden.html">news article</a> confirms that a rather formidable figure has been angling for its return: Richard Fadden, head of the Canadian equivalent of the FBI. Fadden, director of the Canadian Security Intelligence Service (CSIS), wrote in a letter that the highly contentious Bill C-30 was “vital” to protecting national security. The letter was sent to Public Safety Minister Vic Toews, the driver behind Bill C-30, in late February. It was released to the Canadian Press in response to a request filed under the Access to Information Act.</p>
<p>As EFF <a href="https://www.eff.org/deeplinks/2012/02/keep-pressure-canadian-online-surveillance-bill-pause-fight-continues">has noted before</a>, Bill C-30 would introduce new police powers allowing Canadian authorities easy access to individuals’ online activities, including the power to force Internet companies to hand over private customer data without a warrant. It would also pave the way for gag orders preventing online service providers from notifying subscribers that their private data has been disclosed — a move that would make it impossible for users to seek legal recourse for privacy violations.</p>
<p>Similar gag orders are frequently imposed in the United States, when the FBI issues national security letters (NSLs) seeking customer information. In a <a href="https://www.eff.org/deeplinks/2012/07/eff-challenges-national-security-letter-statute-landmark-lawsuit">case EFF has taken on</a> to <a href="http://online.wsj.com/article/SB10001424052702303567704577519213906388708.html">challenge</a> an NSL statute on behalf of a telecommunications company that received one of these secret letters in 2011, fundamental due process and First Amendment issues arising from these gag order provisions are a central concern.</p>
<p>Toews, the bill’s proponent, has made some outrageous claims about Bill C-30. Early on, he stated that opponents of the bill were either with him, "or with the child pornographers,” an apparent attempt to paint the legislation merely as a tool to combat online predators. Yet this framing of the issue was roundly rejected by stakeholders – as EFF <a href="https://www.eff.org/deeplinks/2012/02/keep-pressure-canadian-online-surveillance-bill-pause-fight-continues">reported</a> back in February, internal documents reveal that even the government’s own analysts have claimed the powers in question were<a href="http://www.canada.com/news/Tories+stand+firm+online+spying+legislation/6146676/story.html%23ixzz1nGGdteUW"> actually needed for non-criminal investigations</a>.</p>
<p>Indeed, the legislation met with broad criticism across the board. <a href="http://www.cippic.ca/sites/default/files/20110809-LT_Harper-Re_LawfulAccess-FINAL.pdf">Privacy Experts</a>, <a href="http://unlawfulaccess.net/">academics</a>, all of <a href="http://www.priv.gc.ca/media/nr-c/2011/let_110309_e.cfm">Canada’s Privacy Commissioners</a> (and specifically the <a href="http://www.priv.gc.ca/media/nr-c/2011/let_111027_e.asp">Federal</a>, <a href="http://www.realprivacy.ca/media/2012-04-04-Letter-to-Minister-Toews-re-Bill-C-30.pdf">Ontario</a> and <a href="http://www.oipc.bc.ca/pdfs/public/Bill_C-30_LettertoSECUCommittee%2827Feb2012%29.pdf">British Columbia</a> Commissioners), <a href="http://www.edmontonjournal.com/news/Privacy+costs+vital+variables+federal+anti+child+porn/6178989/story.html">telecommunications companies</a>, major <a href="http://www.nationalpost.com/opinion/licence+snoop/6148203/story.html">Canadian newspapers</a>, all opposition <a href="http://openmedia.ca/news/liberals-join-8-out-10-canadians-standing-against-government%E2%80%99s-warrantless-online-spying-bills">political parties</a>, the <a href="https://www.eff.org/deeplinks/2012/02/keep-pressure-canadian-online-surveillance-bill-pause-fight-continues">Internet community</a>, and more than <a href="http://openmedia.ca/stand">145,000 Canadians</a> who signed an OpenMedia.ca petition spoke out against the legislation because they understood that it represented an unwarranted invasion of Canadians’ online privacy. The message seemed to get through: The legislation was ultimately placed temporarily on hold in the wake of the public outcry.</p>
<p>In spite of this, Fadden made it clear in his letter that he’s eager to see the bill return to Parliament. He offered to help draft revisions to the legislation to strengthen accountability measures, and stated that his agency is available “to support this process through all legislative stages.”</p>
<p>This did not come as a great surprise to Canadian privacy advocates. “CSIS has been a strong (but silent) supporter of the legislation for quite some time,” said Tamir Israel, of the <a href="http://www.cippic.ca/en/privacy">Canadian Internet Policy and Public Interest Clinic</a> (CIPPIC). “Unfortunately, [Fadden’s] statement … offers little that will make this legislation palatable to Canadians. CSIS already has very broad surveillance powers and they have yet to make the case that these new powers are, in fact, necessary for them to continue to do their job.”</p>
<p class="Default">Fadden’s focus on strengthening accountability fails to address the endemic problems in Bill C-30. British Columbia Privacy Commissioner Elizabeth Denham <a href="http://www.oipc.bc.ca/pdfs/public/Bill_C-30_LettertoSECUCommittee%2827Feb2012%29.pdf">hit on the inherent problems with this approach</a> in her assessment of prior government attempts to fix Bill C-30 by introducing stronger accountability:</p>
<blockquote><p><i>I appreciate these changes attempt to improve the legislation. However, they remain premised on, and leave unaltered, the Bill’s fundamental flaw; that law enforcement can obtain an array of personal information about citizens, including real names, home addresses, unlisted numbers, email addresses and IP addresses from Internet service providers, without a warrant.</i></p></blockquote>
<p>The Ontario Privacy Commissioner has also issued a detailed outline of what <a href="http://www.realprivacy.ca/media/2012-04-04-Letter-to-Minister-Toews-re-Bill-C-30.pdf">it would take to fix Bill C-30</a>. And Denham’s perspective is shared by a broad cross-section of Canadians.</p>
<p>“If there's one lesson Toews should have learned from the huge public outcry via the over 145,000+ who have spoken out through the StopSpying.ca petition and social media, it is that the government needs to make an effort to consult Canadians on issues relating to online privacy,” said Steve Anderson of OpenMedia.ca. “Canadians know this online spying bill will provide a range of authorities with the private information of any Canadian, at anytime, without a warrant. The fact is Vic Toews’ online spying plan is invasive, costly and poorly thought out.”</p>
<p>More recently, Toews claimed that Bill C-30 would have helped law enforcement apprehend accused killer Luka Magnotta, who has been charged in the gruesome murder of a Chinese university student. But Dr. Michael Geist, an expert in Internet and E-Commerce law and law professor at the University of Ottawa, immediately debunked this assertion:</p>
<p>“There is simply no question that law enforcement can obtain the necessary warrant on customer name and address information (if an ISP refused as part of an investigation) and police have presumably obtained warrants for far more detailed information. Moreover, the surveillance capabilities at ISPs mandated by C-30 - which focus on real-time surveillance - appear completely irrelevant given that Magnotta fled to France. In fact, <a href="http://www.thedailybeast.com/articles/2012/06/04/canada-s-cannibal-killer-early-reports-warned-about-luka-magnotta.html">reports</a> indicate that there were early warnings about Magnotta and the video openly available that were dismissed by police.”</p>
<p>For his part, Israel characterized Toews’ statements as “more posturing from the Ministry of Justice and more crude attempts to leverage inflammatory issues in order to justify unnecessary and excessive powers.”</p>
<p>EFF continues to stand with Canadian privacy advocates who remain wary of Bill C-30’s return. We will continue to keep an eye on this legislation, which may be revisited once Parliament is back in session this coming fall.</p>
<p> </p>
<p> </p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Proponents%20of%20Canada%E2%80%99s%20Online%20Spying%20Bill%20Still%20Trying%20to%20Justify%20Excessive%20Powers&amp;url=https%3A//www.eff.org/ar/deeplinks/2012/07/proponents-canada-online-spying-bill-still-trying-justify-excessive-powers&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Proponents%20of%20Canada%E2%80%99s%20Online%20Spying%20Bill%20Still%20Trying%20to%20Justify%20Excessive%20Powers&amp;u=https%3A//www.eff.org/ar/deeplinks/2012/07/proponents-canada-online-spying-bill-still-trying-justify-excessive-powers" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2012/07/proponents-canada-online-spying-bill-still-trying-justify-excessive-powers" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Proponents%20of%20Canada%E2%80%99s%20Online%20Spying%20Bill%20Still%20Trying%20to%20Justify%20Excessive%20Powers&amp;url=https%3A//www.eff.org/ar/deeplinks/2012/07/proponents-canada-online-spying-bill-still-trying-justify-excessive-powers" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Sat, 21 Jul 2012 01:01:40 +0000Rebecca Bowe71279 at https://www.eff.orgNews UpdateInternationalInternational Privacy StandardsPrivacyNational Security LettersEFF Challenges National Security Letter Statute in Landmark Lawsuithttps://www.eff.org/ar/deeplinks/2012/07/eff-challenges-national-security-letter-statute-landmark-lawsuit
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Since the first national security letter statute was passed in 1986, the FBI has issued hundreds of thousands of such letters seeking private telecommunications and financial records of Americans without any prior approval from courts. Indeed, for the period between 2003 and 2006 alone, <a href="http://www.usdoj.gov/oig/special/s0803b/final.pdf">almost 200,000 requests for private customer information were sought pursuant to various NSL statutes</a>. Prior to 2011, the constitutionality of this legal authority to investigate the records of Americans without court oversight had been challenged in court -- as far as we know -- exactly one <a href="http://en.wikipedia.org/wiki/National_security_letter#Doe_v._Ashcroft">time</a>. EFF is today releasing FBI-redacted briefing from a <a href="https://www.eff.org/cases/re-matter-2011-national-security-letter">major new ongoing case</a> in which it is challenging one of the NSL statutes on behalf of a telecommunications company that received an NSL in 2011. Not only does this briefing show that the Department of Justice continues to strongly protect the FBI's NSL authority, it highlights a startlingly aggressive new tactic used by the Department of Justice: <a href="https://www.eff.org/node/71216">suing NSL recipients</a> who challenge the FBI's authority, arguing that court challenges to such authority themselves amount to breaking the law.</p>
<p>National security letter statutes -- <a href="http://www.fas.org/sgp/crs/intel/RL33320.pdf">five in all</a> -- are controversial laws that allow the FBI to easily bypass courts and issue administrative letters on their own authority to telecommunications companies and financial institutions demanding information about their customers. The NSL statutes permit the FBI to permanently gag service providers from revealing the fact that the demand was made, preventing them from notifying either their customers or the public. While the statute has many deficiencies, one of the core constitutional issues (already recognized by <a href="http://caselaw.findlaw.com/us-2nd-circuit/1050457.html">one federal appeals court</a>) is that it turns the First Amendment's procedural prior restraint doctrine on its head by allowing the FBI to issue a never-ending prior restraint on its own, then requiring the recipient service provider to undertake a legal challenge. Another fundamental problem with the NSL statutes is that courts are all but written out of any part of the process: the FBI can issue demands for records and gag provisions without court authorization, and recipient telecommunications and financial companies have no way to determine whether and how the government might be overreaching or otherwise abusing its authority. Not surprisingly, given these significant structural barriers, legal challenges are extraordinarily rare.</p>
<p>EFF <a href="https://www.eff.org/node/71206">brought its challenge</a> on behalf of its client in May of 2011, raising these and other fundamental due process and First Amendment concerns about the structure of these problematic statutes. In response, the Department of Justice <a href="https://www.eff.org/node/71216">promptly filed a civil complaint</a> against the recipient, alleging that by "stat[ing] its objection to compliance with the provisions of" the NSL by "exercis[ing] its rights under" the NSL statute to challenge the NSL's legality, the recipient was "interfer[ing] with the United States' vindication of its sovereign interests in law enforcement, counterintelligence, and protecting national security." While it ultimately agreed to a stay, temporarily suspending its suit against the recipient, the government has moved to compel disclosure of the subscriber information and to uphold the gag. The petition to set aside the NSL is currently pending before the United States District Court for the Northern District of California. Whether the recipient will be permitted to speak out about its specific experiences -- and whether the FBI will be permitted to issue NSLs, at least in one district -- should soon be known.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/re-matter-2011-national-security-letter">In re: National Security Letter 2011 (11-2173)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=EFF%20Challenges%20National%20Security%20Letter%20Statute%20in%20Landmark%20Lawsuit&amp;url=https%3A//www.eff.org/ar/deeplinks/2012/07/eff-challenges-national-security-letter-statute-landmark-lawsuit&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=EFF%20Challenges%20National%20Security%20Letter%20Statute%20in%20Landmark%20Lawsuit&amp;u=https%3A//www.eff.org/ar/deeplinks/2012/07/eff-challenges-national-security-letter-statute-landmark-lawsuit" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2012/07/eff-challenges-national-security-letter-statute-landmark-lawsuit" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=EFF%20Challenges%20National%20Security%20Letter%20Statute%20in%20Landmark%20Lawsuit&amp;url=https%3A//www.eff.org/ar/deeplinks/2012/07/eff-challenges-national-security-letter-statute-landmark-lawsuit" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 18 Jul 2012 02:51:41 +0000Matt Zimmerman71251 at https://www.eff.orgAnnouncementPrivacyNational Security LettersTen Years After the Patriot Act, a Look at Three of the Most Dangerous Provisions Affecting Ordinary Americanshttps://www.eff.org/ar/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><span face="Cambria" size="3"><a href="http://www.pbs.org/newshour/updates/terrorism/july-dec01/bush_terrorismbill.html">Ten years ago today</a>, in the name of protecting national security and guarding against terrorism, President George W. Bush signed into law some of the most sweeping changes to search and surveillance law in modern American history. Unfortunately known as the USA PATRIOT Act, many of its provisions incorporate decidedly <i>un</i>patriotic principles barred by the First and Fourth Amendments of the Constitution. Provisions of the PATRIOT Act have been used to target innocent Americans and are widely used in investigations that have nothing to do with national security.</span></p>
<p><span face="Cambria" size="3">Much of the PATRIOT Act was a wish list of changes to surveillance law that <a href="http://www.washingtonpost.com/wp-dyn/content/article/2006/05/09/AR2006050900961_4.html">Congress had previously rejected</a> because of civil liberties concerns. When reintroduced as the PATRIOT Act after September 11<sup>th</sup>, those changes -- and others -- passed with only limited congressional debate. </span></p>
<p><span face="Cambria" size="3">Just what sort of powers does the PATRIOT Act grant law enforcement when it comes to surveillance and sidestepping due process? Here are three provisions of the PATRIOT Act that were sold to the American public as necessary anti-terrorism measures, but are now used in ways that infringe on ordinary citizens’ rights:</span></p>
<p><b><span face="Cambria" size="3">1. SECTION 215 – “ANY TANGIBLE THING”</span></b></p>
<p><span face="Cambria" size="3">Under this provision, the FBI can obtain secret court orders for business records and other “tangible things” so long as the FBI says that the records are sought "for an authorized investigation . . . to protect against international terrorism or clandestine intelligence activities." The Foreign Intelligence Surveillance Court must issue the order if the FBI so certifies, even when there are no facts to back it up. These “things” can include basically anything—driver’s license records, hotel records, car-rental records, apartment-leasing records, credit card records, books, documents, Internet history, and more. Adding insult to injury, Section 215 orders come with a "gag " prohibiting the recipient from telling anyone, ever, that they received one. </span></p>
<p><span face="Cambria" size="3">As the <a href="https://www.nytimes.com/2011/09/22/us/politics/justice-dept-is-accused-of-misleading-public-on-patriot-act.html?_r=1"><i>New York Times</i> reported</a>, the government may now be using Section 215 orders to obtain “private information about people who have no link to a terrorism or espionage case.” The Justice Department has refused to disclose how they are interpreting the provision, but we do have some indication of how they are using Section 215. While not going into detail, <a href="http://www.wired.com/dangerroom/2011/05/secret-patriot-act/">Senator Mark Udall indicated</a> the FBI believes it to allows them “unfettered” access to innocent Americans’ private data, like “a cellphone company’s phone records” in bulk form. The government’s use of these secret orders is sharply increasing -- from 21 orders in 2009 to 96 orders in 2010, an increase of over 400% -- and according to a brand new report from the <a href="http://www.washingtonpost.com/world/national-security/fbi-going-to-court-more-often-to-get-personal-internet-usage-data/2011/10/25/gIQAM7s2GM_story.html">Washington Post</a>, 80% of those requests are for Internet records. </span></p>
<p><span face="Cambria" size="3">Today, <a href="https://www.eff.org/press/releases/eff-sues-answers-about-patriot-act-laws-10th-anniversary">EFF sued the Justice Department</a> to turn over records related to the government’s secret interpretation and use of <a href="https://w2.eff.org/patriot/sunset/215.php">Section 215</a>, regarding which Senator Ron Wyden, like Senator Udall, has offered ominous warnings: "When the American people find out about how their government has secretly interpreted the Patriot Act,” said Wyden <a href="http://news.yahoo.com/blogs/cutline/york-times-sues-obama-administration-over-patriot-act-203926398.html">on the Senate floor in May</a>, “they are going to be stunned and they are going to be angry.”</span></p>
<p><b><span face="Cambria" size="3">2. NATIONAL SECURITY LETTERS</span></b></p>
<p><span face="Cambria" size="3">Among the most used -- and outright frightening -- provisions in the PATRIOT Act are those that enhanced so-called National Security Letters (NSLs). The FBI can issue NSLs itself, without a court order, and demand a variety of records, from phone records to bank account information to Internet activity. As with 215 orders, recipients are gagged from revealing the orders to anyone. </span></p>
<p><span face="Cambria" size="3">While NSLs existed prior to 2001, they were infrequently used. The PATRIOT Act lowered the standard making it easier for the FBI to use NSLs to obtain the records of innocent people with no direct link to terrorists or spies, and their use skyrocketed. According to the ACLU’s <a href="http://www.aclu.org/pdfs/safefree/patriot_report_20090310.pdf">report on PATRIOT Act abuses</a></span>, there were 8,500 NSLs issued in 2000 but approximately 192,000 issued between 2003-2006. All of these NSL’s led to <i>one </i>terror conviction, and in that case, the <a href="http://www.aclu.org/national-security/surveillance-under-patriot-act">NSL wasn’t even needed</a>.</p>
<p><span face="Cambria" size="3">Not surprisingly, <a href="https://www.eff.org/deeplinks/2007/07/eff-receives-first-set-foia-documents-fbis-misuse-national-security-letter-authori">EFF FOIA requests</a></span> have found abuse of their NSL authority: “mistakes” that led to getting information on the wrong people, ISPs handing over extra or wrong information, and dozens of <a href="https://www.eff.org/flag/07656JDB/070507_nsl03.pdf">“exigent letters”</a> that “circumvented the law and violated FBI guidelines and policies.” EFF has successfully challenged the NSL gag orders <a href="https://www.eff.org/issues/national-security-letters">in multiple cases</a> as unconstitutional under the First Amendment, but the overall scheme still survives to this day.<b></b></p>
<p><b><span face="Cambria" size="3">3. SNEAK AND PEEK WARRANTS</span></b></p>
<p><span face="Cambria" size="3">Section 213 of the PATRIOT Act normalized <a href="https://ssd.eff.org/your-computer/govt/sneak-and-peek">“sneak-and-peek” warrants</a></span>. These allow law enforcement to raid a suspect’s house without notifying the recipient of the seizure for months. These orders usually don't authorize the government to actually seize any property — but that won't stop them from poking around your computers. Again, sneak-and-peek warrants could be used for <i>any</i> investigation, even if the crime was only a misdemeanor.</p>
<p><span face="Cambria" size="3"><a href="http://nymag.com/news/9-11/10th-anniversary/patriot-act/">From 2006-2009</a></span>, sneak-and-peek warrants were used a total of 1,755 times. Only fifteen of those cases—a microscopic 0.8%—involved terrorism. The rest were used in cases involving drugs or fraud.</p>
<p><span face="Cambria" size="3">These uses and abuses of the PATRIOT Act against ordinary Americans are only the tip of the iceberg. EFF has <a href="https://www.eff.org/deeplinks/2011/03/documents-obtained-eff-reveal-fbi-patriot-act">repeatedly documented</a> how federal law enforcement agencies have abused <a href="https://www.eff.org/deeplinks/2011/10/dangers-classifying-news">our nation’s broken secrecy system</a> to hide <a href="https://www.eff.org/deeplinks/2011/01/eff-releases-report-detailing-fbi-intelligence">specific instances</a> of illegal and unconstitutional conduct related to the PATRIOT Act. </span>EFF’s Freedom of Information Act requests <a href="https://www.eff.org/deeplinks/2010/12/fbi-arbitrarily-covers-evidence-misconduct">have painted a picture of</a> “an [FBI] engaged in excessive illegal intelligence gathering.”</p>
<p><span face="Cambria" size="3">After ten years, it’s crystal clear that the “emergency” measure sold as a necessary step in the fight against terrorism is being used routinely to violate the privacy of regular people in non-terrorism cases, threatening the Constitutional rights of every one of us. And after ten years, EFF is even more dedicated to fighting against PATRIOT overreach, both in Congress and the courts. Help us in that fight by <a href="https://supporters.eff.org/join">becoming an EFF member</a></span>, so that we can work together in making the next ten years better for civil liberties than the last.<b></b></p>
<p><span face="Cambria" size="3"> </span></p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Ten%20Years%20After%20the%20Patriot%20Act%2C%20a%20Look%20at%20Three%20of%20the%20Most%20Dangerous%20Provisions%20Affecting%20Ordinary%20Americans&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Ten%20Years%20After%20the%20Patriot%20Act%2C%20a%20Look%20at%20Three%20of%20the%20Most%20Dangerous%20Provisions%20Affecting%20Ordinary%20Americans&amp;u=https%3A//www.eff.org/ar/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Ten%20Years%20After%20the%20Patriot%20Act%2C%20a%20Look%20at%20Three%20of%20the%20Most%20Dangerous%20Provisions%20Affecting%20Ordinary%20Americans&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 26 Oct 2011 19:23:59 +0000Trevor Timm67649 at https://www.eff.orgCommentaryTransparencyFree SpeechPrivacyNational Security LettersPATRIOT ActNewly Released Documents Reveal Defense Department Intelligence Violationshttps://www.eff.org/ar/deeplinks/2011/09/newly-released-documents-reveal-defense-department
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>EFF just received documents that reveal additional post-9/11 Defense Department misconduct, including attempts by the Army to investigate participants at a conference on Islamic law at the University of Texas Law School and Army-issued National Security Letters (NSLs) to telecommunications providers in violation of the law.</p>
<p>EFF received these documents in response to a <a href="https://www.eff.org/foia/intelligence-agencies-misconduct">2009 Freedom of Information Act (FOIA) lawsuit</a> that we filed against the DoD and a half-dozen other federal agencies involved in intelligence gathering. In the lawsuit, we demanded the immediate release of reports about potential and actual agency misconduct, and the agencies have since released thousands of heavily-redacted pages, some of which we have discussed <a href="https://www.eff.org/deeplinks/2011/03/documents-obtained-eff-reveal-fbi-patriot-act">here</a>, <a href="https://www.eff.org/deeplinks/2011/01/eff-releases-report-detailing-fbi-intelligence">here</a>, <a href="https://www.eff.org/deeplinks/2010/02/pentagon-discloses-hundreds-reports-possibly">here</a> and <a href="https://www.eff.org/deeplinks/2009/12/intelligence-agencies-release-docs-describing-misc">here</a>.</p>
<p>Now, thanks to a recent Supreme Court case, we have more. In March 2011, after the DoD released most of its records to EFF, the Supreme Court decided an important FOIA case called <i><a href="http://www.law.cornell.edu/supct/html/09-1163.ZS.html">Milner v. Department of Navy</a></i>, 131 S.Ct. 1259 (2011). The case involved one of the exemptions to FOIA, <a href="http://www.law.cornell.edu/uscode/usc_sec_05_00000552----000-.html">5 U.S.C. §552(b)(2)</a>, that allows agencies to withhold information “related solely to the internal personnel rules and practices of an agency.” A <a href="http://openjurist.org/670/f2d/1051/crooker-v-bureau-of-alcohol-tobacco-and-firearms">1981 case</a> from the DC Circuit Court of Appeals interpreted this exemption broadly to cover “predominantly internal” materials whose disclosure would “significantly ris[k] circumvention of agency regulation or statutes,” and since that time agencies, including and especially the DoD, have relied on this broad interpretation of (b)(2) to withhold a ton of important information. In March, the Supreme Court overturned this reading of the exemption and held (b)(2) is limited solely to records relating to employee relations and human resources issues.</p>
<p>The <i>Milner</i> decision is important for our case because the DoD and other agencies withheld a significant amount of information under the broader interpretation of (b)(2). As our case is still in litigation, the agencies are now required to release that previously-withheld information to us (or determine it can be exempted under another section of the FOIA).</p>
<p>The small amount of re-released documents we’ve received so far fills in some of the holes in the picture of the federal government’s post-9/11 intelligence violations, just as it raises more questions. Here’s what the records reveal, with the graphics comparing the first government disclosures with the newly released records (move the slider back and forth to see the different versions):</p>
<h3><b>Army-Issued NSLs</b></h3>
<div id="container1">
<div><img alt="before" src="/files/NSLs-redacted_hl.png" height="340" width="600" /></div>
<div><img alt="after" src="/files/NSLs-not-redacted_hl.png" height="340" width="600" /></div>
</div>
<p>In 2004, an Army Special Agent <a href="https://www.eff.org/files/Army_NSLs.pdf">issued three NSLs</a> (pdf) for customer phone records directly to a communications company. The NSL statute, <a href="http://www.law.cornell.edu/uscode/usc_sec_18_00002709----000-.html">18 U.S.C. §2709</a>, only authorizes the FBI to issue NSLs, and specifically prohibits NSL recipients from telling anyone, including the customer, about the request. As the Army does not have the authority to issue NSLs, this Special Agent clearly violated the law. The Army did not discover the illegal requests until after the Agent received customer records from the communications company. Perhaps the most amazing thing about the story is that, according to the report,</p>
<blockquote><p><i>neither the Army unit nor the FBI Field Offices [with which the Army agent was working] were aware that these requests had to be made by the FBI.</i></p></blockquote>
<p>If we can’t rely on our government employees to know and understand the law, how can we rely on them to apply it appropriately?</p>
<h3><b>Investigation of University of Texas Conference Attendees</b></h3>
<div id="container2">
<div><img alt="before" src="/files/UT_investigation_redacted2_hl.png" height="240" width="600" /></div>
<div><img alt="after" src="/files/UT_Investigation_not_redacted2_hl.png" height="240" width="600" /></div>
</div>
<p>A <a href="https://www.eff.org/files/UT_Investigation.pdf">2004 Army intelligence violation report</a> (pdf) noted that two Army lawyers attended a conference on Islamic law at the University of Texas Law School without disclosing their military affiliation. Some conference participants discovered who they were and challenged why they were there. The Army lawyers, believing that the conference participants had asked “inappropriate questions,” decided to investigate them. Without any investigative authority or jurisdiction (the military’s authority to investigate civilians in the United States is very limited), two Army Special Agents went to UT to ask about three conference attendees. The Army’s internal investigation into the matter concluded that the Special Agents had,</p>
<blockquote><p><i>improperly conducted investigative activity directed against three civilians within the U.S., who were outside Army counterintelligence investigative jurisdiction and failed to refer the matter to the FBI as they were required to do.</i></p></blockquote>
<p>This report confirms once again that the US government has been improperly targeting Muslims in the United States. As we <a href="https://www.eff.org/deeplinks/2009/12/intelligence-agencies-release-docs-describing-misc">reported previously</a>, records we received from the Department of Homeland Security (DHS) noted that in 2008, DHS's Office of Intelligence and Analysis <a href="https://www.eff.org/files/Georgia.pdf">improperly collected intelligence</a> (pdf) about a non-violent Muslim conference in Georgia, including details about conference speakers who were Americans, and in 2007, DHS I&amp;A <a href="https://www.eff.org/files/NationOfIslam.pdf">improperly investigated</a> (pdf) the U.S.-based religious organization the Nation of Islam. And just last week, <a href="http://www.wired.com/dangerroom/2011/09/fbi-muslims-radical/">Wired reported</a> that the FBI "is teaching its counterterrorism agents that “main stream” [sic] American Muslims are likely to be terrorist sympathizers."</p>
<h3><b>Joint FBI/DoD Surveillance Operations</b></h3>
<div id="container3">
<div><img alt="before" src="/files/Joint_FBI_NCIS_redacted_hl.png" height="200" width="600" /></div>
<div><img alt="after" src="/files/Joint_FBI_NCIS_not_redacted_hl.png" height="200" width="600" /></div>
</div>
<p>Finally, <a href="https://www.eff.org/files/DoD_FBI_collaboration.pdf">several pages</a> (pdf) refer to joint missions between the FBI and DoD, including a Joint FBI/National Criminal Investigations Service (NCIS) counterespionage operation in which an NCIS “asset” apparently went undercover into a US organization. This violates a <a href="http://atsdio.defense.gov/documents/52410.html">DoD regulation</a> that severely limits the ability of DoD employees to participate in US organizations’ activities without disclosing “their affiliation with the intelligence component . . . to an appropriate official of the organization.” Based on <a href="https://www.eff.org/deeplinks/2010/02/pentagon-discloses-hundreds-reports-possibly">earlier releases</a>, we already knew that several components of the DoD conducted surveillance on US organizations, including Planned Parenthood and anti-war groups, and we already knew the DoD worked together with the FBI on investigations, so it’s unclear why the DoD felt it was so important originally to redact this information.</p>
<p>The release of these documents shows just how broadly the DoD was applying the (b)(2) FOIA exemption to prevent the public from knowing what went on in post-9/11 America. None of the information above should have been redacted under even the broadest, pre-<i>Milner</i> interpretation of (b)(2), and we can only assume these redactions are representative of how the DoD has applied other FOIA exemptions to its records as well. The DoD and other agencies should proactively release the rest of the records withheld under (b)(2). If they don't, we will address this along with other exemption issues as we move forward with litigation in our FOIA case this fall.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/foia/intelligence-agencies-misconduct-reports">Intelligence Agencies&#039; Misconduct Reports</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Newly%20Released%20Documents%20Reveal%20Defense%20Department%20Intelligence%20Violations&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/09/newly-released-documents-reveal-defense-department&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Newly%20Released%20Documents%20Reveal%20Defense%20Department%20Intelligence%20Violations&amp;u=https%3A//www.eff.org/ar/deeplinks/2011/09/newly-released-documents-reveal-defense-department" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2011/09/newly-released-documents-reveal-defense-department" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Newly%20Released%20Documents%20Reveal%20Defense%20Department%20Intelligence%20Violations&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/09/newly-released-documents-reveal-defense-department" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 22 Sep 2011 18:13:43 +0000Jennifer Lynch61523 at https://www.eff.orgTransparencyPrivacyNational Security LettersEFF Lets the Sunshine Inhttps://www.eff.org/ar/deeplinks/2011/03/EFF-Lets-the-Sun-Shine-In
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>This week marks the seventh annual <a href="http://www.sunshineweek.org">Sunshine Week</a>, a national initiative to promote dialogue about the importance of open government and freedom of information. As our little way to celebrate, EFF has recently posted nearly nine thousand pages of government documents to our site. For the majority of these documents, many of which were previously classified, this is the first time these files have been added to the public domain. The documents were all obtained in conjunction with EFF’s <a href="/issues/foia">FOIA Litigation for Accountable Government (FLAG) Project</a>, which aims to expose the government's expanding use of new technologies and to protect civil liberties by increasing government transparency.</p>
<p>The trove of documents include:</p>
<ul><li><b><a href="/foia/intelligence-agencies-misconduct">Intelligence Agencies' Misconduct Reports</a></b>: nearly<a href="https://www.eff.org/fn/directory/8443/421"> 2,500 pages of documents </a> detailing reports of FBI intelligence violations submitted to the Intelligence Oversight Board from 2001 to 2008, which we reported on <a href="/wp/patterns-misconduct-fbi-intelligence-violations">here</a></li>
<li><b><a href="https://www.eff.org/foia/foia-cross-border-electronic-funds-transfers">Cross-Border Electronic Funds Transfers</a></b>: almost <a href="https://www.eff.org/fn/directory/12519/424">1,500 pages of documents</a> related to the Financial Crimes Enforcement Network’s (FinCEN) proposed rule requiring reporting of all cross-border financial transactions, which we blogged about <a href="//www.eff.org/deeplinks/2010/12/sending-money-overseas-holidays-government-wants">here</a></li>
<li><b><a href="/foia/foia-dcs-5000-redwolf">DCS-5000 ("Redwolf")</a></b>: approximately <a href="/fn/directory/12559/429"> 3,500 pages of documents</a> related to the FBI’s latest-generation digital collection system, the DCS-5000, codenamed "Redwolf"</li>
<li><b><a href="https://www.eff.org/foia/talon-reporting">TALON Reporting</a></b>: almost <a href="https://www.eff.org/fn/directory/12696/432">200 pages of documents</a> related to the Department of Defense's Threat and Local Observation Notice (TALON) reports, including the collection of information on peaceful protesters and domestic advocacy groups</li>
<li><b><a href="https://www.eff.org/foia/net-neutrality-lobbying">Net Neutrality Lobbying</a></b>: <a href="/foia/net-neutrality-lobbying">50 pages of documents</a> related to records of meetings or discussions between FCC officials and representatives of telecommunications, cable, and Internet companies and organizations concerning potential net neutrality regulations</li>
<li><b><a href="https://www.eff.org/foia/foia-printer-dots">Printer Dots</a></b>: almost <a href="https://www.eff.org/fn/directory/12564/430">700 pages of documents</a> related to federal government agencies' use of "printer dots" -- tracking codes embedded in pages printed from certain printers</li>
</ul><p>EFF also posted supplemental responses to three other FOIA requests concerning <a href="https://www.eff.org/issues/foia/07656JDB">national security letters</a> (<a href="https://www.eff.org/files/filenode/07656JDB/20100506_dodig_nsl.pdf">23 pages</a> (pdf)), <a href="https://www.eff.org/foia/pen-registers">the government's use of pen registers</a> (<a href="/fn/directory/7604/423">185 pages</a>), and <a href="/foia/dhs-passenger-data">international traveler data sharing</a> (<a href="/fn/directory/7821/343">219 pages</a>).</p>
<p>"A democracy," it has been said, "cannot function unless the people are permitted to know what their government is up to." And that's exactly why we do what we do: the FLAG Project's goal is to make our democracy stronger by exposing and challenging threats to our civil liberties in a networked world. But increasing government transparency and accountability isn't something we can do alone. We need your help, too -- whether it's by helping us <a href="/deeplinks/2011/03/eff-seeks-cooperating-foia-reviewers">review FOIA releases</a>, by <a href="/action">taking action</a>, or by <a href="/donate/index.php?s_src=https%3A%2F%2Fwww.eff.org%2Faction&amp;s_subsrc=navbar">supporting our work</a>, our ability to increase transparency is only as strong as <em>our</em> network. So this week, go ahead and join us -- let a little sunshine in.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/foia/talon-reporting">TALON Reporting</a></div><div class="field-item odd"><a href="/ar/foia/foia-printer-dots">Printer Dots</a></div><div class="field-item even"><a href="/ar/foia/pen-registers">Pen Registers</a></div><div class="field-item odd"><a href="/ar/foia/net-neutrality-lobbying">Net Neutrality Lobbying</a></div><div class="field-item even"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div><div class="field-item odd"><a href="/ar/foia/intelligence-agencies-misconduct-reports">Intelligence Agencies&#039; Misconduct Reports</a></div><div class="field-item even"><a href="/ar/foia/dhs-passenger-data">DHS Passenger Data</a></div><div class="field-item odd"><a href="/ar/foia/foia-dcs-5000-redwolf">DCS-5000 &quot;Redwolf&quot;</a></div><div class="field-item even"><a href="/ar/foia/foia-cross-border-electronic-funds-transfers">Cross-Border Electronic Funds Transfers</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=EFF%20Lets%20the%20Sunshine%20In&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/03/EFF-Lets-the-Sun-Shine-In&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=EFF%20Lets%20the%20Sunshine%20In&amp;u=https%3A//www.eff.org/ar/deeplinks/2011/03/EFF-Lets-the-Sun-Shine-In" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2011/03/EFF-Lets-the-Sun-Shine-In" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=EFF%20Lets%20the%20Sunshine%20In&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/03/EFF-Lets-the-Sun-Shine-In" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 16 Mar 2011 17:03:58 +0000Mark Rumold61293 at https://www.eff.orgTransparencyNational Security LettersPATRIOT ActPen TrapPrintersTell Your Representative to Reject the PATRIOT Act Sneak Attack Before Tomorrow's Vote!https://www.eff.org/ar/deeplinks/2011/02/tell-your-representative-reject-patriot-act-sneak-0
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><i>Tell your Congressperson to vote NO on the <a href="http://www.eff.org/issues/patriot-act">USA PATRIOT Act</a> in tomorrow's vote! The PATRIOT reauthorization bill being fast-tracked to the House floor contains NO reforms to the law, and will be voted upon with NO debate and NO opportunity for amendments to add oversight and accountability. Help stop this sneak attack on your civil liberties: there are only hours left to visit our <a href="https://secure.eff.org/site/Advocacy?cmd=homepage&amp;page=UserAction&amp;id=461">Action Center</a> and tell your Representative to vote "NO" on <a href="http://www.govtrack.us/congress/bill.xpd?bill=h112-514">H.R. 514</a>, the PATRIOT extension bill.</i></p>
<p>In late 2009, when PATRIOT reauthorization was originally being considered by Congress, many important PATRIOT reform measures were proposed and debated, and <a href="http://www.eff.org/deeplinks/2009/11/battle-won-not-war-patriot-reform-bill-passes-out-">a bill filled with powerful new checks and balances</a> was reported favorably out of the House Judiciary Committee. But, as Congress ran up against the renewal deadline, it decided that there was not enough time to fully consider those reforms. So, in February 2010, Congress instead <a href="http://www.eff.org/deeplinks/2010/02/epic-fail-congress-usa-patriot-act-renewed-without">extended</a> the "sunsetting" sections of the law until the end of this February, with a promise to fully consider the issues before the next deadline.</p>
<p>But Congress is breaking its promise to consider reforms to the PATRIOT Act. In a legislative sneak attack, the new Republican leadership in the House is trying push Representatives to rubber-stamp another PATRIOT renewal. The House leaders just announced on Friday that they’ll be "suspending the rules" so that a bill introduced by Rep. Sensenbrenner to extend the expiring PATRIOT provisions until December 8, 2011 will go to the House floor for a vote TOMORROW, without any debate and without any opportunity for anyone to offer amendments to improve the bill. </p>
<p>In particular, the bill would renew the following dangerously unchecked PATRIOT powers:</p>
<p>• The government’s power under PATRIOT Section 215 to obtain secret court orders for Internet, phone and business records of people who are not suspected of terrorism or spying;<br />
• The government’s "lone wolf wiretapping" power, allowing it to get court orders authorizing secret foreign intelligence wiretaps against individuals who have no connection to any foreign power or terrorist group; and<br />
• The government’s power to obtain blank-check "roving" wiretap orders that can be used to tap any phone number, email account or other communications facility that the government believes is being used by its target.</p>
<p>These provisions should not be renewed, and certainly not without any debate or any new checks and balances to prevent abuse and protect civil liberties. So please <a href="https://secure.eff.org/site/Advocacy?cmd=homepage&amp;page=UserAction&amp;id=461">act now</a> to tell your Representatives that they should vote NO to the PATRIOT Act in tomorrow's vote! </p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Tell%20Your%20Representative%20to%20Reject%20the%20PATRIOT%20Act%20Sneak%20Attack%20Before%20Tomorrow%27s%20Vote%21&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/02/tell-your-representative-reject-patriot-act-sneak-0&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Tell%20Your%20Representative%20to%20Reject%20the%20PATRIOT%20Act%20Sneak%20Attack%20Before%20Tomorrow%27s%20Vote%21&amp;u=https%3A//www.eff.org/ar/deeplinks/2011/02/tell-your-representative-reject-patriot-act-sneak-0" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2011/02/tell-your-representative-reject-patriot-act-sneak-0" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Tell%20Your%20Representative%20to%20Reject%20the%20PATRIOT%20Act%20Sneak%20Attack%20Before%20Tomorrow%27s%20Vote%21&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/02/tell-your-representative-reject-patriot-act-sneak-0" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Mon, 07 Feb 2011 20:07:27 +0000Kevin Bankston61263 at https://www.eff.orgCall To ActionPATRIOT ActPrivacyNational Security LettersEFF Uncovers Widespread FBI Intelligence Violationshttps://www.eff.org/ar/deeplinks/2011/01/eff-releases-report-detailing-fbi-intelligence
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>EFF has uncovered widespread violations stemming from FBI intelligence investigations from 2001 - 2008. In a <a href="/pages/patterns-misconduct-fbi-intelligence-violations"><b>report released today</b></a>, EFF documents alarming trends in the Bureau’s intelligence investigation practices, suggesting that FBI intelligence investigations have compromised the civil liberties of American citizens far more frequently, and to a greater extent, than was previously assumed.</p>
<p>Using documents obtained through <a href="https://www.eff.org/foia/intelligence-agencies-misconduct">EFF's Freedom of Information Act (FOIA) litigation</a>, the report finds:</p>
<p>• <i>Evidence of delays of 2.5 years, on average, between the occurrence of a violation and its eventual reporting to the Intelligence Oversight Board </i></p>
<p>• <i>Reports of serious misconduct by FBI agents including lying in declarations to courts, using improper evidence to obtain grand jury subpoenas, and accessing password-protected files without a warrant</i></p>
<p>• <i>Indications that the FBI may have committed upwards of 40,000 possible intelligence violations in the 9 years since 9/11</i></p>
<p>EFF's report stems from analysis of nearly 2,500 pages of FBI documents, consisting of reports of FBI intelligence violations made to the <a href="https://secure.wikimedia.org/wikipedia/en/wiki/President%27s_Intelligence_Advisory_Board#Intelligence_Oversight_Board">Intelligence Oversight Board</a> — an independent, civilian intelligence-monitoring board that reports to the President on the legality of foreign and domestic intelligence operations. The documents constitute the most complete picture of post-9/11 FBI intelligence abuses available to the public. Our earlier analysis of the documents showed the <a href="https://www.eff.org/deeplinks/2010/12/fbi-arbitrarily-covers-evidence-misconduct">FBI's arbitrary disclosure practices</a>.</p>
<p>EFF's report underscores the need for greater transparency and oversight in the intelligence community. <a href="https://www.eff.org/issues/foia">As part of our ongoing effort</a> to inform the public and elected officials about abusive intelligence investigations, we are distributing copies of the report to members of Congress.</p>
<p>A pdf copy of the report can be downloaded <a href="https://www.eff.org/files/EFF IOB Report.pdf">here</a>.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/foia/intelligence-agencies-misconduct-reports">Intelligence Agencies&#039; Misconduct Reports</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=EFF%20Uncovers%20Widespread%20FBI%20Intelligence%20Violations&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/01/eff-releases-report-detailing-fbi-intelligence&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=EFF%20Uncovers%20Widespread%20FBI%20Intelligence%20Violations&amp;u=https%3A//www.eff.org/ar/deeplinks/2011/01/eff-releases-report-detailing-fbi-intelligence" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2011/01/eff-releases-report-detailing-fbi-intelligence" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=EFF%20Uncovers%20Widespread%20FBI%20Intelligence%20Violations&amp;url=https%3A//www.eff.org/ar/deeplinks/2011/01/eff-releases-report-detailing-fbi-intelligence" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Sun, 30 Jan 2011 11:41:24 +0000Mark Rumold61254 at https://www.eff.orgNews UpdateTransparencyNational Security LettersPATRIOT ActThe FBI Arbitrarily Covers Up Evidence of Misconduct: Is This the Transparency Obama Promised?https://www.eff.org/ar/deeplinks/2010/12/fbi-arbitrarily-covers-evidence-misconduct
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>EFF recently received documents in response to one of our Freedom of Information Act (FOIA) requests that demonstrate a disturbing trend: the FBI's arbitrary application of FOIA exemptions to hide, or in some instances, reveal, its unlawful activities.</p>
<p>Through a careful comparison of thousands of pages of documents we received from this FOIA request with the same documents we received from an earlier FOIA request, we found that redactions in many of these duplicated documents were strikingly different. In several cases, the FBI redacted <i>more</i> information in <i>later</i>-produced documents than it did in earlier-produced documents. In other cases, the FBI redacted differing amounts of information when it produced two copies of the same report in response to the same FOIA request. Sometimes the agency blocked out whole paragraphs, while at other times it blocked out only the key words that explain the details of its acts. What is interesting is that the FBI claimed the same FOIA exemptions in each version; it just applied them differently.</p>
<p>The documents at issue are reports submitted by the FBI to the Intelligence Oversight Board (IOB), a body that is charged with overseeing the intelligence community's compliance with the Constitution and intelligence laws. In all, the documents total almost 2500 pages, and we'll discuss the troubling picture they paint of an agency engaged in excessive illegal intelligence gathering in a later post. But first, below, are side-by-side comparisons of four reports and an overview of the information they reveal (move the slider to see the differences). Following that is our analysis of what this means for the public’s access to information about our government.</p>
<h2><b>The Documents</b></h2>
<h3><b>1. FBI IOB Report 2001-69 - NSL for Financial Records</b></h3>
<div id="container1">
<div><img alt="before" width="615" height="454" src="/files/beforeafterimages/NSL_financial1.png" /></div>
<div><img alt="after" width="615" height="454" src="/files/beforeafterimages/NSL_financial2.png" /></div>
</div>
<p>We received two copies of the same report in response to our more recent FOIA request to the FBI. The same exemptions were claimed in both copies of the report but <a href="/files/IOB_FOIA-2001-69-v1.pdf">Version 1</a> is much more heavily redacted than <a href="/files/IOB_FOIA-2001-69-v2.pdf">Version 2</a>.</p>
<p>The report discusses the FBI’s improper collection of bank and credit card records. In Version 1, all important information about the violation (including that it relates to financial records) was withheld. Version 2 reveals most of the details and shows the extent of the FBI’s violation. In this matter, the FBI, as part of an ongoing investigation into international terrorism, sought hotel and financial records on a subject. Although the agent responsible had no legal authority to obtain the financial records, he or she purposefully styled a request to a financial institution as a National Security Letter (NSL) to hide this fact, essentially lying to obtain the bank and credit card information. There is likely no way the financial institution receiving the NSL would have been able to tell the letter was illegal and thus no one would have been able to challenge this violation of the law. And even if the bank found out the NSL was illegal, the “gag order” accompanying all NSLs at the time would have prevented the bank from talking about it publicly.</p>
<h3><b>2. FBI IOB Report 2003-115 — Illegal Use of FISA-Authorized Pen Register</b></h3>
<div id="container2">
<div><img alt="before" width="615" height="338" src="/files/beforeafterimages/Illegal_Pen_Register_1.png" /></div>
<div><img alt="after" width="615" height="338" src="/files/beforeafterimages/Illegal_Pen_Register_2.png" /></div>
</div>
<p>We received <a href="/files/NSL_FOIA-2003-115-v1.pdf">Version 1</a> of the report above in response to our FOIA request from 2007. This version details the FBI’s use of a telephone number collected under a FISA-authorized pen register/trap and trace surveillance to support a federal grand jury subpoena in a criminal investigation. This is problematic because the law clearly precludes the FBI from using a FISA-derived telephone number in a criminal case without the Attorney General’s prior approval. And, it appears from the report that the Bureau did not have the AG’s approval before proceeding with the grand jury subpoena.</p>
<p>The FBI sent us <a href="/files/IOB_FOIA-2003-115-v2.pdf">Version 2</a> of the report this fall in response to our 2008 FOIA. In Version 2, the Bureau has blocked out all important identifying details.</p>
<h3><b>3. FBI IOB Report 2006-305 — NSL for “All Images Uploaded”</b></h3>
<div id="container3">
<div><img alt="before" width="615" height="386" src="/files/beforeafterimages/All_Images_1.png" /></div>
<div><img alt="after" width="615" height="386" src="/files/beforeafterimages/All_Images_2.png" /></div>
</div>
<p>We received <a href="/files/NSL_FOIA-2006-305-v1.pdf">Version 1</a> of the report above in response to our FOIA request from 2007. The FBI sent us <a href="/files/IOB_FOIA-2006-305-v2.pdf">Version 2</a> this fall.</p>
<p>On first glance, the amount of information withheld in Version 2 of this report does not appear as extensive as in the two reports above. Upon closer inspection, however, the FBI has blocked out all details of its illegal activity in Version 2. This IOB report describes the agency’s attempts to use an NSL to obtain not only transactional information (a legal use of an NSL) but also all the images a subject uploaded to his ISP. As the IOB report notes, the FBI is not allowed to use an NSL to get this type of content information. (The three types of information available under an NSL are "Subscriber and Toll Billing Records," "Financial Records," and "Consumer Credit Records.") The other piece of information withheld in Version 2 of this report is the specific section of the Attorney General’s Guidelines on foreign intelligence collection that was violated. It’s unclear why the agency would have felt it necessary to block out this information, as this section of the Guidelines merely describes what information is available pursuant to an NSL (a redacted version of the Guidelines is available <a href="http://www.fas.org/irp/agency/doj/fbi/nsiguidelines.pdf">here</a>).</p>
<h3><b>4. FBI IOB Report 2007-717 — NSL for Educational Records</b></h3>
<div id="container4">
<div><img alt="before" width="615" height="482" src="/files/beforeafterimages/educational_1.png" /></div>
<div><img alt="after" width="615" height="482" src="/files/beforeafterimages/educational_2.png" /></div>
</div>
<p>We received <a href="/files/NSL_FOIA-2007-717-v1.pdf">Version 1</a> of the report above in response to our FOIA request from 2007. This document (which, in its less redacted version, was the subject of an earlier <a href="https://www.eff.org/issues/foia/report-nsl-ncstate">EFF report</a>) details how the FBI tried to use a National Security Letter to obtain educational records on a student at a state university in North Carolina. As we noted in our earlier report, educational records are very clearly not one of the three classes of information available under an NSL. Luckily, the university’s legal counsel recognized this and refused to comply with the NSL.</p>
<p>The FBI sent us <a href="/files/IOB_FOIA-2007-717-v2.pdf">Version 2</a> of the report this fall. Like the third report discussed above, the redactions in this version don’t appear, at first glance, to be extensive. However, when compared with Version 1, it’s clear the FBI has withheld the entire meat of the story.</p>
<h2><b>Analysis</b></h2>
<p>The Freedom of Information Act requires the government to disclose details of its activities to the public. Although certain exemptions within the Act allow agencies to withhold some information (for example where national security or personal privacy is at issue), the presumption is in favor of disclosure. President Obama reiterated this on his first full day of office by <a href="http://www.whitehouse.gov/the_press_office/FreedomofInformationAct/">directing</a>:</p>
<blockquote><p>The Freedom of Information Act should be administered with a clear presumption: In the face of doubt, openness prevails. The Government should not keep information confidential merely because public officials might be embarrassed by disclosure, because errors and failures might be revealed, or because of speculative or abstract fears.</p></blockquote>
<p>Many applauded the President at the time for ushering in a new era of transparency in government. However, our review of these documents finds that not only has the FBI failed to comply with this “presumption of openness,” but in fact in some cases, the amount and type of information withheld under the Obama administration is far greater than the amount of information withheld under the supposedly more “closed” Bush administration.</p>
<p>This certainly isn’t the first time we’ve seen evidence that an arm of the Justice Department has withheld more than it is entitled to under FOIA. We found this in the FBI’s response of one of our earlier FOIA requests and reported on it <a href="https://www.eff.org/pages/sunshine2010">here</a>. More recently, the New York Times <a href="https://www.nytimes.com/2010/11/14/us/14nazis.html">reported</a> on the Justice Department’s attempts to keep from the public eye evidence of its embarrassing role in the US government’s “collaboration with [Nazi] persecutors.”</p>
<p>This trend is problematic because it puts Americans at a distinct disadvantage in obtaining information necessary to be informed about how our government operates. In each of these cases, if we or the Times had not obtained a second version of the document, we likely would not have been able to discover the agency’s cover up. The FOIA exemptions claimed by the agency are difficult to challenge in court, and the agency, by virtue of the fact that it has access to all the text, clearly has the upper hand.</p>
<p>In the recent controversy over the latest WikiLeaks release, <a href="http://online.wsj.com/article/SB10001424052748703989004575653280626335258.html">many have argued</a> that WikiLeaks’ release of unredacted and in some cases classified documents has put the United States at risk. However, the documents WikiLeaks has released have also informed Americans about the actions of our government, both the good and in many cases the bad. These documents tell us what the government is up to, and also fuel an educated public debate about government activities. These are the goals of FOIA, and when the FOIA process works properly (i.e., when agencies do not withhold more information than they are entitled to under the Act and do not drag their feet on releasing records until someone challenges them either through a request or litigation), all Americans benefit. However, when federal agencies arbitrarily withhold information and don’t play by the rules, it makes it more likely that entities like WikiLeaks will feel the need to work around a broken system that seems to encourage unnecessary secrecy.</p>
<p>Federal agencies should not be able to hide their missteps behind white blocks. We plan to bring this to the court’s attention in our lawsuit challenging the FBI and other agencies’ improper withholding of reports submitted to the Intelligence Oversight Board.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div><div class="field-item odd"><a href="/ar/foia/intelligence-agencies-misconduct-reports">Intelligence Agencies&#039; Misconduct Reports</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=The%20FBI%20Arbitrarily%20Covers%20Up%20Evidence%20of%20Misconduct%3A%20Is%20This%20the%20Transparency%20Obama%20Promised%3F&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/12/fbi-arbitrarily-covers-evidence-misconduct&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=The%20FBI%20Arbitrarily%20Covers%20Up%20Evidence%20of%20Misconduct%3A%20Is%20This%20the%20Transparency%20Obama%20Promised%3F&amp;u=https%3A//www.eff.org/ar/deeplinks/2010/12/fbi-arbitrarily-covers-evidence-misconduct" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2010/12/fbi-arbitrarily-covers-evidence-misconduct" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=The%20FBI%20Arbitrarily%20Covers%20Up%20Evidence%20of%20Misconduct%3A%20Is%20This%20the%20Transparency%20Obama%20Promised%3F&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/12/fbi-arbitrarily-covers-evidence-misconduct" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Wed, 08 Dec 2010 19:44:28 +0000Jennifer Lynch61189 at https://www.eff.orgCommentaryNational Security LettersTransparencyDOJ Pushing to Expand Warrantless Access to Internet Recordshttps://www.eff.org/ar/deeplinks/2010/07/doj-pushing-expand-warrantless-access-internet
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>This morning's Washington Post <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/07/28/AR2010072806141.html">reveals</a> that the Department Of Justice has been pressuring Congress to expand its power to obtain records of Americans' private Internet activity through the use of <a href="http://www.eff.org/issues/national-security-letters">National Security Letters (NSLs)</a>.</p>
<p>NSLs, you may remember, are one of the most powerful and frightening tools of government surveillance to be expanded by the Patriot Act. These letters allow the FBI to secretly demand data from phone companies and internet service providers about the private communications of ordinary citizens. The letters include a gag order, which forbids recipients from ever revealing the letters' existence to their coworkers, their friends, or even to their family members, much less the public. </p>
<p>The gag order and the lack of oversight make this power ripe for abuse. Indeed, the FBI's systemic abuse of this power was confirmed both by <a href="http://www.washingtonpost.com/wp-dyn/content/article/2008/03/13/AR2008031302277.html">a Department Of Justice investigation</a> and in <a href="http://www.eff.org/issues/foia/07656JDB">documents obtained by EFF</a> through Freedom of Information Act litigation. Yet, in the years since that abuse became publicly known, there has been no reform of the law governing NSLs.</p>
<p>Now, the DOJ is asking Congress to pass vague and broad new language meant to expand the kinds of data that can be acquired through NSLs. This morning's Washington Post article suggests that the new language could allow access to detailed web browsing history, search history, location information, or even Facebook friend requests.</p>
<p>Considering the FBI's dismal record on surveillance abuses, this is a stunning and brazen request. They're asking Congress to reward bad behavior by allowing even more bad behavior. We're hoping that Congress will have the courage and integrity to turn them down. Keep reading Deeplinks for more news on this as it develops.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=DOJ%20Pushing%20to%20Expand%20Warrantless%20Access%20to%20Internet%20Records&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/07/doj-pushing-expand-warrantless-access-internet&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=DOJ%20Pushing%20to%20Expand%20Warrantless%20Access%20to%20Internet%20Records&amp;u=https%3A//www.eff.org/ar/deeplinks/2010/07/doj-pushing-expand-warrantless-access-internet" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2010/07/doj-pushing-expand-warrantless-access-internet" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=DOJ%20Pushing%20to%20Expand%20Warrantless%20Access%20to%20Internet%20Records&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/07/doj-pushing-expand-warrantless-access-internet" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 29 Jul 2010 19:13:30 +0000Tim Jones61077 at https://www.eff.orgNews UpdateNational Security LettersSunshine Week 2010: FOIA Could Still Shed More Lighthttps://www.eff.org/ar/deeplinks/2010/03/sunshine-week-2010
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>As the transparency community celebrates <a href="http://www.sunshineweek.org/">Sunshine Week</a>, we here at EFF are reminded that most of the federal agencies we seek to monitor through our <a href="http://www.eff.org/issues/foia">Freedom of Information Act work</a> continue to cloak their activities in excessive secrecy. We have grown accustomed to receiving agency documents with large amounts of information blacked out — or "redacted" in the official parlance. While we often suspect that many of these deletions are made to conceal innocuous, or perhaps embarrassing, information, it is usually impossible to confirm those suspicions. But in some rare instances, we are able to learn precisely what a recalcitrant agency has improperly withheld from public view.</p>
<p>Such an opportunity recently arose when the Washington Post <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/01/18/AR2010011803982_pf.html">published</a> a series of internal FBI e-mail messages concerning the Bureau's abuse of <a href="http://en.wikipedia.org/wiki/National_Security_Letter">national security letter</a> (NSL) authority. NSLs are used to obtain, among other things, telephone toll billing records and subscriber information, and electronic communication transactional records. In <a href="http://www.docstoc.com/docs/5791797/A-Review-of-the-Federal-Bureau-of-Investigations-Use">a report</a> issued in March 2007, the Justice Department's Inspector General concluded that the FBI had systematically violated the law by improperly issuing hundreds of NSLs without proper authorization. Within days of the IG's report, EFF submitted a <a href="http://www.eff.org/issues/foia/07656JDB">FOIA request to the FBI</a> for documents detailing these abuses. Of the tens of thousands of pages of material that the Bureau eventually identified as responsive to our request, the vast majority of the relevant information was redacted.</p>
<p>The e-mail messages published by the Washington Post were obtained from an FBI whistleblower who had been directly involved in the Bureau's handling of NSLs. Through a careful comparison of the redacted material originally released to EFF with the <em>unredacted</em> messages recently published by the Washington Post, we were able to see precisely what the Bureau withheld. We were particularly struck by the fact that the FBI redacted all references to a proposal that had been floated within the Bureau to legitimize questionable demands for communications records — so-called "exigent letters" — a plan that the DOJ Inspector General clearly described in his report:</p>
<blockquote><p>Our review of contemporaneous e-mail communications . . . found that for nearly 2 years, beginning in late 2004, [FBI National Security Law Branch] attorneys counseled CAU [Communications Analysis Unit] officials to take a variety of actions, including . . . opening "umbrella" investigations out of which national security letters could be issued in the absence of another pending investigation. . . .</p>
<p>The Assistant General Counsel at first proposed the establishment of six "generic" or "umbrella" investigations representing the recurring types of threats investigated by the Counterterrorism Division. The proposal contemplated that the FBI would issue national security letters from these files in exigent circumstances when there were no other pending investigations to which the request could be tied.</p></blockquote>
<p>As the <a href="http://www.eff.org/pages/sunshine2010">side-by-side comparison of the redacted and full-text e-mail messages</a> shows, the FBI withheld all references to its proposal to use "generic" or "umbrella" investigations as a rationale to justify questionable demands for sensitive information relating to private communications. It is worth noting that the FBI continued to withhold this information even after President Obama and Attorney General Holder announced that a new "presumption of openness" should guide agency FOIA implementation. Despite the Attorney General's assertion that the Justice Department would only defend an agency's decision to withhold information if it could demonstrate a "foreseeable harm" from disclosure, in this instance DOJ attorneys defended the FBI's withholding of information that was revealed by the Department's own Inspector General three years ago.</p>
<p>FOIA is a powerful tool, and this example of over-redaction demonstrates the need to continue seeking a culture of transparency and trust from our government. President Obama took the first step by <a href="http://www.eff.org/deeplinks/2009/01/on-day-one-obama-demands-open-government">declaring</a> that "[a]ll agencies should adopt a presumption in favor of disclosure, in order to renew their commitment to the principles embodied in FOIA, and to usher in a new era of open Government," and organizations like EFF are making sure that the government remembers its promise. But Sunshine Week exists to remind citizens, journalists, members of Congress, and folks both inside and outside the transparency movement to continue seeking honest disclosure using all the tools that exist: rigorous investigations, hearings, and actual, public oversight.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Sunshine%20Week%202010%3A%20FOIA%20Could%20Still%20Shed%20More%20Light&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/03/sunshine-week-2010&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Sunshine%20Week%202010%3A%20FOIA%20Could%20Still%20Shed%20More%20Light&amp;u=https%3A//www.eff.org/ar/deeplinks/2010/03/sunshine-week-2010" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2010/03/sunshine-week-2010" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Sunshine%20Week%202010%3A%20FOIA%20Could%20Still%20Shed%20More%20Light&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/03/sunshine-week-2010" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Mon, 15 Mar 2010 17:07:11 +0000David Sobel60951 at https://www.eff.orgCommentaryTransparencyNational Security LettersOver Redaction in Audit of FBI’s Use of Illegal Exigent Lettershttps://www.eff.org/ar/deeplinks/2010/01/over-redaction-audit-fbi-s-use-illegal-exigent-let
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Earlier this week, the DOJ’s Inspector General issued a heavily redacted <a href="http://www.justice.gov/oig/special/s1001r.pdf">report</a> about the FBI’s Communications Analysis Unit (CAU), which found "shocking" violations, including embedded telecom employees providing customer phone records in response to post-it notes.</p>
<p>While the underlying violations are egregious enough, the report itself is problematic because it redacts huge swaths of information that is already publicly known. </p>
<p>As we discussed in our last <a href="https://www.eff.org/deeplinks/2010/01/fbi-replaced-legal-process-post-it-notes-obtain-ph">blog post</a>, the report cryptically refers to AT&amp;T, Verizon and MCI as Company A, B and C. Yet, the source that identified the telecoms embedded with the CAU was none other than FBI General Counsel Valerie Caproni, in sworn testimony before Congress. Moreover, information in the IG report combined with letters to Congress from the telecoms themselves shows that Company A is AT&amp;T.</p>
<p>The IG report also redacts the amount paid to the telecoms when we already <a href="http://www.wired.com/threatlevel/2007/07/fbi-unit-that-l/">know</a> they were paid $1.8 million a year, and that, in 2008, the FBI <a href="http://www.wired.com/images_blogs/threatlevel/files/communicationsexploitationoffice08budget.pdf">asked</a> Congress for $5.3 million for further "funding for the telecommunications industry participation in the Telecommunications Data Collection Center (TDCC)."</p>
<p>The IG Report discusses the unlawful use of exigent letters to obtain phone records of Washington Post and New York Times reporters, but redacts the reporters’ names, the year it took place, and the location where the reporters operated. Yet, in 2008, FBI Director Robert Mueller <a href="http://www.washingtonpost.com/wp-dyn/content/article/2008/08/08/AR2008080803603.html">apologized</a> to the newspapers for the incident, and confirmed that the reporters were the Post staff writer Ellen Nakashima and Indonesian researcher Natasha Tampubolon, and New York Times reporters Raymond Bonner and Jane Perlez. These reporters were in the Jakarta bureau, and the incident took place in 2004. </p>
<p>The report reveals that AT&amp;T routinely provided the FBI with the "community of interest" profiles of its customers without any legal process. However, the DOJ redacted a large section of the report that discusses what a "community of interest" is, including an explanatory diagram. Yet, AT&amp;T itself has published <a href="http://www2.research.att.com/~kobus/docs/coi.pdf">several</a> <a href="http://www2.research.att.com/~sen/pub/Sen_COI_worms_NDSS06.pdf">research</a> <a href="http://www2.research.att.com/~volinsky/papers/portugal.ps">papers</a> extensively discussing communities of interest. Basically, your community of interest includes the people you call and who call you, and the people with whom this group communicates. It is sometimes refined by frequency or by time period. AT&amp;T even <a href="http://www.wired.com/threatlevel/2007/10/att-invents-pro/">published</a> the Hancock programming language, which AT&amp;T designed to analyze communities of interest, and "sift calling card records, long distance calls, IP addresses and internet traffic dumps, and even track the physical movements of mobile phone customers as their signal moves from cell site to cell site." AT&amp;T published this <a href="http://www.wired.com/images_blogs/photos/uncategorized/2007/10/29/guilt_by_association_3.jpg">graphic</a>, which illustrates AT&amp;T using what they call "guilt by association" to determine fraud within a community of interest (the shaded boxes). </p>
<p>Finally, the IG report redacts a <a href="http://www.eff.org/files/OIGExigentReport1-2010-excerpt.pdf">new legal theory</a> proferred by the FBI, which purports to allow telecoms to disclose your phone records without legal process or any emergency. While this theory has not been published elsewhere (the Office of Legal Counsel opinion was written earlier this month), controversial legal theories should not be kept secret. Senators Feingold, Durbin and Wyden have <a href="http://static1.firedoglake.com/28/files/2010/01/100122-Letter-to-AG-Holder.pdf">asked</a> Attorney General Eric Holder to publish the OLC memo. </p>
<p>We urge the Obama Administration to follow through on its commitment to openness and transparency, and release an unredacted version of the IG report. </p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Over%20Redaction%20in%20Audit%20of%20FBI%E2%80%99s%20Use%20of%20Illegal%20Exigent%20Letters&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/01/over-redaction-audit-fbi-s-use-illegal-exigent-let&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Over%20Redaction%20in%20Audit%20of%20FBI%E2%80%99s%20Use%20of%20Illegal%20Exigent%20Letters&amp;u=https%3A//www.eff.org/ar/deeplinks/2010/01/over-redaction-audit-fbi-s-use-illegal-exigent-let" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2010/01/over-redaction-audit-fbi-s-use-illegal-exigent-let" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Over%20Redaction%20in%20Audit%20of%20FBI%E2%80%99s%20Use%20of%20Illegal%20Exigent%20Letters&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/01/over-redaction-audit-fbi-s-use-illegal-exigent-let" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Sat, 23 Jan 2010 01:21:53 +0000Kurt Opsahl60905 at https://www.eff.orgCommentaryTransparencyPrivacyNational Security LettersReport Confirms FBI Misuse of Authority to Obtain Phone Recordshttps://www.eff.org/ar/deeplinks/2010/01/report-confirms-fbi-misuse-authority
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>The <i>Washington Post</i> <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/01/18/AR2010011803982_pf.html">reported</a> today that the "FBI illegally collected more than 2,000 U.S. telephone call records," using methods that FBI general counsel Valerie Caproni admitted "technically violated the <a href="http://ilt.eff.org/index.php/Privacy:_Statutory_Protections#Electronic_Communications_Privacy_Act_of_1986">Electronic Communications Privacy Act</a> when agents invoked nonexistent emergencies to collect records."</p>
<p>This issue first came to light in a <a href="http://www.docstoc.com/docs/5791797/A-Review-of-the-Federal-Bureau-of-Investigations-Use">March 2007 report</a> by the DOJ's Office of the Inspector General, which revealed that the FBI's Communications Analysis Unit (CAU) had routinely been using “exigent letters” to obtain customer information from telecommunications companies, <a href="//blog.wired.com/27bstroke6/2007/03/fbi_confirms_co.html.">including Verizon and AT&amp;T</a>.</p>
<p>“Exigent letters” are informal requests (<i>i.e.</i>, not subpoenas, warrants, court orders, or other statutory requests) that ask telecoms to provide “call detail records” about particular subscribers, and, in some <a href="http://www.eff.org/files/filenode/07656JDB/080607_exigent_letters_coi.pdf">letters</a>, <a href="http://www.eff.org/deeplinks/2007/09/doj-s-community-interest-letters-are-illegal">illegally</a> asking telecoms to disclose the subscriber's “community of interest" (friends of friends' phone records). </p>
<p>A follow up <a href="http://www.justice.gov/oig/special/s0902/index.htm">Office of the Inspector General (OIG) report</a>, released early last year, found hundreds of illegal letters, while today's report uncovered thousands. The 2009 OIG report determined "that by issuing exigent letters the FBI circumvented the NSL statutes and violated the Attorney General’s Guidelines and internal FBI policy." Courts have agreed, concluding that the emergency exception is reserved for voluntary disclosures in response to specific and urgent emergencies. Since the FBI has kept secret whose records were subject to these illegal letters, the victims will be unable to seek redress in court.</p>
<p>In a press release today, the FBI <a href="http://www.fbi.gov/pressrel/pressrel10/exigentletters_011910.htm">contends</a> that the misuse stopped in 2006, and that it now has "numerous systems to ensure compliance with all the legal requirements associated with their requests for telephone records." </p>
<p>This is a song we've heard before. Former Attorney General Gonzales told Congress in 2005 and 2007 that there were no problems with National Security Letters, when <a href="http://www.eff.org/deeplinks/2007/07/fbi-records-show-gonzales-knew-about-years-chronic-nsl-problems">documents would later show</a> that Gonzales was well aware of problems. A high-profile <a href="http://www.eff.org/issues/foia/report-nsl-ncstate">misuse</a> of a National Security Letter went unreported for two years, even though the matter received the personal attention of FBI Director Robert S. Mueller III, as well as officials with the FBI Office of the General Counsel. These misuses came to light as a result of EFF's <a href="http://www.eff.org/issues/foia">FOIA Litigation for Accountable Government (FLAG) Project</a>. </p>
<p>Likewise, the exigent circumstances letter problem persisted for years, unreported and unremedied. Reform did not happen when the FBI Office of the General Counsel <a href="http://www.washingtonpost.com/wp-srv/investigative/documents/nsl_documents_7_011910.pdf">first learned</a> of the illegal practice in 2004. Only after public disclosure in March 2007 did the FBI begin <a href="http://www.justice.gov/opa/pr/2007/March/07_nsd_168.html">reform efforts</a>.</p>
<p>Nor did NSL misuse problems stop in 2006, as the FBI might have you believe. An August 2007 FBI legal memorandum asserted an extremely broad view of the <a href="http://ilt.eff.org/index.php/Privacy:_Stored_Communications_Act#National_Security_Letters">NSL statute</a>, which the DOJ later <a href="http://www.usdoj.gov/olc/2008/fbi-ecpa-opinion.pdf">determined</a> (in November 2008) was incorrect. </p>
<p>Openness and transparency is the only solution to keeping the misuse of investigative powers in check. Through our FLAG Project, EFF continues to pursue a <a href="http://www.eff.org/issues/foia/07656JDB">Freedom of Information Act case</a> against the government, seeking more records of the misuse of National Security Letter authority. The violations revealed today were not disclosed by the FBI during the course of our pending lawsuit, and we intend to raise that issue with the court.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Report%20Confirms%20FBI%20Misuse%20of%20Authority%20to%20Obtain%20Phone%20Records&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/01/report-confirms-fbi-misuse-authority&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Report%20Confirms%20FBI%20Misuse%20of%20Authority%20to%20Obtain%20Phone%20Records&amp;u=https%3A//www.eff.org/ar/deeplinks/2010/01/report-confirms-fbi-misuse-authority" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2010/01/report-confirms-fbi-misuse-authority" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Report%20Confirms%20FBI%20Misuse%20of%20Authority%20to%20Obtain%20Phone%20Records&amp;url=https%3A//www.eff.org/ar/deeplinks/2010/01/report-confirms-fbi-misuse-authority" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Tue, 19 Jan 2010 23:15:26 +0000Kurt Opsahl60898 at https://www.eff.orgCommentaryTransparencyPrivacyNational Security LettersBreaking News: House of Representatives Enters PATRIOT Fray With Two New Surveillance Reform Billshttps://www.eff.org/ar/deeplinks/2009/10/breaking-news-house-representatives-enters-patriot
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>This afternoon, leaders in the House of Representatives introduced their own USA PATRIOT Act reform bill, responding to the disappointing PATRIOT renewal bill approved by the Senate Judiciary Committee <a href="http://www.eff.org/deeplinks/2009/10/obama-sides-republicans-patriot-act-renewal-bill-p">two weeks ago</a>. The new bill — the USA Patriot Amendments Act of 2009 (HR 3845) — was introduced by House Judiciary Committee Chairman John Conyers, Jr.; Constitution, Civil Rights, and Civil Liberties Subcommittee Chairman Jerrold Nadler; and Crime, Terrorism, and Homeland Security Subcommittee Chairman Bobby Scott. </p>
<p>The text of the bill is available <a href="http://www.eff.org/files/text_USA_Patriot_Amendments_Act_of_2009_Oct_20.pdf">here [PDF]</a>; a section-by-section summary of the bill is available <a href="http://www.eff.org/files/Section_by_Section_Analysis_Bill_1_Oct_19.pdf">here [PDF]</a>. Based on EFF's initial review, the new bill is a significant improvement over the deeply flawed Senate bill, containing a substantial number of significant new checks and balances to the government's spying authorities under the PATRIOT Act — much like Senator Feingold's <a href="http://www.eff.org/deeplinks/2009/09/eff-supports-justice">JUSTICE Act</a> in the Senate, which was supported by EFF.</p>
<p>Not only have Representatives Conyers, Nadler, and Scott introduced a strong PATRIOT reform bill, but they've also gone <em>even farther</em> in seeking to protect their constituents' civil liberties by introducing a <em>second bill</em> (HR 3846) directed at reforming last year's FISA Amendments Act (FAA), which broadly expanded the government's authority to wiretap Americans without warrants and granted immunity to telcos that broke the law by assisting in the NSA's warrantless wiretapping program. The second bill introduced today — which, amongst other reforms, would prohibit the "bulk collection" of Americans' emails and phone calls under the FAA and would repeal the FAA's telco immunity provision — is available <a href="http://www.eff.org/files/text_FISA_Amendments_Act_of_2009_Oct_20.pdf">here [PDF]</a>, with a section-by-section summary <a href="http://www.eff.org/files/The_FISA_Amendments_Act_of_2009_Section_by_Section_101909.pdf">here [PDF]</a>. A press release from House Judiciary describing both bills is available <a href="http://judiciary.house.gov/news/091020.html">here</a>.</p>
<p><a href="http://www.eff.org/deeplinks/2009/09/patriot-act-debate-must-include-reform-last-years-">As we've said before</a>, fixing PATRIOT without fixing the FAA is, from a civil liberties perspective, like rearranging deck chairs on the Titanic. We are incredibly thankful to these House leaders for working to reform both PATRIOT <em>and</em> the FAA.</p>
<p>We'll have more analysis and calls to action concerning these bills shortly, but wanted to post the materials as soon as possible, and to thank Representatives Conyers, Nadler and Scott for standing up for Americans' privacy. We look forward to helping to preserve the strong reforms in the bills — and hopefully to add some new ones — when they are considered by the House Judiciary Committee in coming weeks.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Breaking%20News%3A%20House%20of%20Representatives%20Enters%20PATRIOT%20Fray%20With%20Two%20New%20Surveillance%20Reform%20Bills&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/breaking-news-house-representatives-enters-patriot&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Breaking%20News%3A%20House%20of%20Representatives%20Enters%20PATRIOT%20Fray%20With%20Two%20New%20Surveillance%20Reform%20Bills&amp;u=https%3A//www.eff.org/ar/deeplinks/2009/10/breaking-news-house-representatives-enters-patriot" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2009/10/breaking-news-house-representatives-enters-patriot" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Breaking%20News%3A%20House%20of%20Representatives%20Enters%20PATRIOT%20Fray%20With%20Two%20New%20Surveillance%20Reform%20Bills&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/breaking-news-house-representatives-enters-patriot" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Tue, 20 Oct 2009 22:18:57 +0000Kevin Bankston60821 at https://www.eff.orgLegislative AnalysisPATRIOT ActPrivacyNSA SpyingNational Security LettersRound-Up of Reactions to Yesterday's PATRIOT Votehttps://www.eff.org/ar/deeplinks/2009/10/round-reactions-yesterdays-patriot-vote
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://www.eff.org/deeplinks/2009/10/obama-sides-republicans-patriot-act-renewal-bill-p">Yesterday</a>, as the Senate Judiciary Committee voted to recommend and send to the Senate floor a USA PATRIOT Act renewal bill lacking critical civil liberties reforms, <a href="http://washingtonindependent.com/63221/civil-libertarians-dismayed-by-patriot-amendments">EFF's reaction</a> was much the same as Senator Feingold's, as he expressed in <a href="http://www.dailykos.com/storyonly/2009/10/8/791144/-Its-Not-the-Prosecutors-Committee,-its-the-Judiciary-Committee">his post-vote blog post</a> at Daily Kos. </p>
<p>Feingold, one of only three Democrats to vote against the bill and a sponsor of the PATRIOT reform bill <a href="http://www.eff.org/deeplinks/2009/09/eff-supports-justice">the JUSTICE Act</a>, was left scratching his head over how a Democratic super-majority with a Democratic Administration could so thoroughly fail at reforming the PATRIOT Act, a law long maligned by Democrats as an affront to civil liberties. He closed by posing a choice to his Democratic colleagues: "In the end...Democrats have to decide if they are going to stand up for the rights of the American people or allow the FBI to write our laws."</p>
<p>That sentiment echoed Feingold's words during the PATRIOT meeting itself: "We're not the Prosecutors' Committee, we're the Judiciary Committee!" A video excerpt of Feingold's stand for civil liberties is <a href="http://emptywheel.firedoglake.com/2009/10/08/feingold-were-not-the-prosecutor-committee-were-the-judiciary-committee/">here</a>, while video of the entire meeting is <a href="http://judiciary.senate.gov/hearings/hearing.cfm?id=4107">here</a>; see also <a href="http://emptywheel.firedoglake.com/2009/10/08/patriot-hearing-liveblog/">Emptywheel's live-blogging of the hearing</a> and <a href="http://www.juliansanchez.com/">Julian Sanchez</a>'s frustrated <a href="http://twitter.com/normative">live-tweeting</a>. Sanchez, <a href="http://getfisaright.wordpress.com/2009/10/08/emptywheel-blogging-up-a-storm/">like Emptywheel</a>, has been consistently churning out <a href="http://www.juliansanchez.com/2009/10/05/monday-patriot-roundup/">excellent material on the PATRIOT debate</a>. </p>
<p>Funnily and disappointingly, as you listen to the video, you can hear Committee Chairman Leahy — typically a stalwart civil liberties advocate — letting out an exasperated "oh boy" as Feingold rallies against the bill. Leahy disappointingly voted for the amendments to weaken the bill's new privacy protections and ultimately for the bill itself, after being pressed for a final vote by Senator Feinstein, who can be heard in the video at 155:58 urging the Chairman to "do it, do it!"</p>
<p>In contrast to Leahy, Senator Specter — a former Chairman of the Committee who recently switched parties to join the Democrats — <a href="http://washingtonindependent.com/62966/sen-specter-emerges-as-key-civil-liberties-advocate-in-patriot-act-markup">emerged as a key civil liberties advocate</a>, joining with Senators Feingold and Durbin to vote for reform amendments and against the final bill.</p>
<p>A special disappointment at yesterday's hearing was freshman Senator Al Franken's vote for the bill, which amongst other things renewed PATRIOT's "roving" "John Doe" wiretap authority allowing the government to get a wiretapping order that doesn't name the wiretapping target or specify the phone lines and email accounts to be wiretapped. Just two weeks ago, <a href="http://emptywheel.firedoglake.com/2009/10/08/frankens-fleeting-fourth-amendment/">Senator Franken was lecturing a Justice Department official</a> on how the Fourth Amendment requires that search warrants specify with particularity the persons and places to be searched. He was right, then; he was wrong, yesterday.</p>
<p>Another sad but humorous moment of disappointment came from Senator Klobuchar, who opposed Senator Durbin's amendment to ensure that the FBI only use National Security Letters to obtain records related to a spy or terrorist. Thinking that she was reading the text of the bill that she was about to vote for, Klobuchar recited instead Senator Durbin's proposal to defend the reasonableness of the NSL standard in the bill. In other words, as the transcript reprinted <a href="http://irregulartimes.com/index.php/archives/2009/10/08/oops-klobuchar-praises-civil-liberties-amendment-she-votes-against/">here</a> shows, Senator Klobuchar praised the NSL standard in Durbin's amendment immediately before she voted to help kill it.</p>
<p>However, the biggest disappointment of all yesterday was the Obama Administration itself. Of the seven amendments to water down the bill's civil liberties protections that were offered by the Committee Republicans, at least five of them were recommended by Obama's Justice Department. As one anonymous Democratic staffer told <a href="http://thecaucus.blogs.nytimes.com/2009/10/08/judiciary-panel-approves-patriot-act-sections/">the New York Times</a>, the amendments "were a verbatim transfer of the text of amendments the Obama administration had privately sent to Congress on Wednesday."</p>
<p>Additional news accounts of the PATRIOT debate and vote included reports from Wired's <a href="http://www.wired.com/threatlevel/2009/10/pariot-act-renewal/">Threat Level</a> blog, the <a href="http://news.yahoo.com/s/ap/20091008/ap_on_go_co/us_patriot_act">Associated Press</a>, the <a href="http://www.washingtonpost.com/wp-dyn/content/article/2009/10/08/AR2009100804170.html?hpid=moreheadlines">Washington Post</a>, the <a href="http://online.wsj.com/article/SB125504554628574775.html?mod=WSJ_hpp_MIDDLENexttoWhatsNewsSecond">Wall Street Journal</a>, <a href="http://www.pcworld.com/article/173378/senate_panel_approves_extension_of_patriot_act.html">IDG News Service</a>, <a href="http://www.cqpolitics.com/wmspage.cfm?docID=cqmidday-000003219627">CQPolitics</a> and <a href="http://techdailydose.nationaljournal.com/2009/10/groups-criticize-patriot-act-a.php">the National Journal</a>.</p>
<p>As we said yesterday, this vote isn't the end of the fight: there is still a chance to improve the PATRIOT renewal bill — or stop it — on the Senate floor. There's also still a chance that the House Judiciary Committee and ultimately the full House will respond to yesterday's events by introducing and passing its own, more reform-minded, PATRIOT bill. When that happens, you can learn all about it here at Deeplinks; in the meantime, we need your help to keep the pressure on the Senate to support PATRIOT reforms like those in the JUSTICE Act. So, if you haven't already, please <a href="https://secure.eff.org/site/Advocacy?cmd=display&amp;page=UserAction&amp;id=441">contact your Senator today</a>!</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Round-Up%20of%20Reactions%20to%20Yesterday%27s%20PATRIOT%20Vote&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/round-reactions-yesterdays-patriot-vote&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Round-Up%20of%20Reactions%20to%20Yesterday%27s%20PATRIOT%20Vote&amp;u=https%3A//www.eff.org/ar/deeplinks/2009/10/round-reactions-yesterdays-patriot-vote" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2009/10/round-reactions-yesterdays-patriot-vote" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Round-Up%20of%20Reactions%20to%20Yesterday%27s%20PATRIOT%20Vote&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/round-reactions-yesterdays-patriot-vote" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 09 Oct 2009 20:04:44 +0000Kevin Bankston60814 at https://www.eff.orgLegislative AnalysisPATRIOT ActPrivacyNational Security LettersObama Sides with Republicans; PATRIOT Act Renewal Bill Passes Senate Judiciary Committee Minus Critical Civil Liberties Reformshttps://www.eff.org/ar/deeplinks/2009/10/obama-sides-republicans-patriot-act-renewal-bill-p
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Well, it looks like most of the Senators on the Senate Judiciary Committee weren't swayed by this morning's <a href="http://www.nytimes.com/2009/10/08/opinion/08thu1.html">New York Times editorial</a>, which cited this morning's Committee meeting to consider USA PATRIOT Act renewal as a "critical chance to add missing civil liberties and privacy protections, address known abuses and trim excesses that contribute nothing to making America safer." Instead, the Committee just passed a bill to renew all of the PATRIOT powers that were set to expire at the end of the year, with only a handful of the original reforms that were first proposed by Senators Feingold and Durbin's <a href="http://www.eff.org/deeplinks/2009/09/eff-supports-justice">JUSTICE Act</a> and Committee Chairman Leahy's <a href="http://www.eff.org/deeplinks/2009/09/patriot-debate">original PATRIOT renewal bill</a>.</p>
<p>Instead of adding more protections to the bill, as EFF and the Times have been urging (along with many other Americans who have been organizing <a href="http://get-fisa-right.wetpaint.com/page/Patriot+Act+Action+Hub">Facebook and Twitter activism</a> around PATRIOT reform), the Committee this morning voted to accept seven Republican amendments to the USA PATRIOT Act Sunset Extension Act to <em>remove</em> the few civil liberties protections left in the bill after it was already watered down at <a href="http://www.eff.org/deeplinks/2009/10/liveblogging-senate-judiciary-patriot-act-mark">last</a> <a href="http://www.eff.org/deeplinks/2009/10/tip-hat-wag-finger-patriot-edition">Thursday's</a> Committee meeting. Surprisingly and disappointingly, most of those amendments were recommended to their Republican sponsors <em>by the Obama Administration</em>.</p>
<p>After voting on amendments (vote counts and text of the amendments are now available on <a href="http://judiciary.senate.gov/">the Committee's web site</a>), the Committee voted to pass the PATRIOT bill itself, 11 to 8. Some Democrats voted against it, agreeing with us that it didn't protect civil liberties enough, while some Republicans voted against it because of the few meager privacy improvements it did include.</p>
<p>Those who voted AYE:<br />
Leahy, D-Vermont<br />
Kohl, D-Wisconsin<br />
Feinstein, D-California<br />
Schumer, D-New York<br />
Cardin, D-Maryland<br />
Whitehouse, D-Rhode Island<br />
Klobuchar, D-Minnesota<br />
Kaufman, D-Delaware<br />
Franken, D-Minnesota<br />
Kyl, R-Arizona<br />
Cornyn, R-Texas</p>
<p>Those who voted NAY:<br />
Feingold, D-Wisconsin<br />
Durbin, D-Illinois<br />
Specter, D-Pennsylvania<br />
Sessions, R-Alabama<br />
Hatch, R-Utah<br />
Grassley, R-Iowa<br />
Graham, R-South Carolina<br />
Coburn, R-Oklahoma</p>
<p>EFF extends its heartfelt gratitude to the only three Democrats who continually stood up for civil liberties throughout this process and ultimately voted no on the final bill: Senators Feingold, Durbin and Specter. We particularly thank Senator Durbin for doing his best to pass an amendment to reform the government's authority to issue <a href="http://w2.eff.org/patriot/sunset/505.php">National</a> <a href="http://www.eff.org/press/archives/2008/05/06">Security</a> <a href="http://www.eff.org/issues/foia/07656JDB">Letters</a> (NSLs) for Americans' records without having to show any connection between the records sought to a suspected terrorist or spy, and Senator Specter for cosponsoring Senator Feingold's ultimately unsuccessful attempt to pass an amendment to let the so-called "lone wolf" wiretapping authority expire. We especially thank Senator Feingold for offering an amendment to stop the government from using last summer's <a href="http://www.eff.org/deeplinks/2009/09/patriot-act-debate-must-include-reform-last-years-">FISA Amendments Act</a> to conduct "bulk collection" of Americans' phone calls and Internet communications, even though that amendment was ultimately withdrawn and not voted on after procedural objections from Chairman Leahy. Finally, we congratulate Senator Feingold on the success of his amendment to require that the government "minimize" the records that it obtains with NSLs.</p>
<p>As for the others on the Committee, and especially the Obama Administration: you let down the American people today, undermining our constitutional rights and endorsing a bill that doesn't do nearly enough to protect our privacy. We look forward to taking this fight to the floor of the Senate.</p>
<p>To do that, though, we need the help of concerned citizens like <em>you</em>: if you haven't already, please <a href="https://secure.eff.org/site/Advocacy?cmd=display&amp;page=UserAction&amp;id=441">contact your Senator now</a> to support the reforms in the JUSTICE Act, which may still be attached to the bill when it is debated by the full Senate. This fight isn't over by a long shot.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Obama%20Sides%20with%20Republicans%3B%20PATRIOT%20Act%20Renewal%20Bill%20Passes%20Senate%20Judiciary%20Committee%20Minus%20Critical%20Civil%20Liberties%20Reforms&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/obama-sides-republicans-patriot-act-renewal-bill-p&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Obama%20Sides%20with%20Republicans%3B%20PATRIOT%20Act%20Renewal%20Bill%20Passes%20Senate%20Judiciary%20Committee%20Minus%20Critical%20Civil%20Liberties%20Reforms&amp;u=https%3A//www.eff.org/ar/deeplinks/2009/10/obama-sides-republicans-patriot-act-renewal-bill-p" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2009/10/obama-sides-republicans-patriot-act-renewal-bill-p" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Obama%20Sides%20with%20Republicans%3B%20PATRIOT%20Act%20Renewal%20Bill%20Passes%20Senate%20Judiciary%20Committee%20Minus%20Critical%20Civil%20Liberties%20Reforms&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/obama-sides-republicans-patriot-act-renewal-bill-p" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 08 Oct 2009 19:09:49 +0000Kevin Bankston60811 at https://www.eff.orgLegislative AnalysisPATRIOT ActPrivacyNational Security LettersTip of the Hat, Wag of the Finger: PATRIOT Editionhttps://www.eff.org/ar/deeplinks/2009/10/tip-hat-wag-finger-patriot-edition
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Yesterday's Senate Judiciary mark-up of legislation to renew expiring provisions of the USA PATRIOT Act was extremely disheartening--in particular because of many committee Democrats' failure to support new civil liberties reforms to PATRIOT(see our summary <a href="http://www.eff.org/deeplinks/2009/10/liveblogging-senate-judiciary-patriot-act-mark">here</a>). Those Senators who failed to stand foursquare behind Americans' right to privacy against government spying should be on notice that Americans who care about civil liberties are very disappointed; those that did stand up for our rights deserve our vocal thanks.</p>
<p>Our first wag of the finger goes to Senators Leahy and Feinstein. We expressed our <a href="http://www.eff.org/deeplinks/2009/09/patriot-debate">disappointment with Senator Leahy</a> last week when instead of sponsoring the Feingold/Durbin <a href="http://www.eff.org/deeplinks/2009/09/eff-supports-justice">JUSTICE Act</a> he introduced his own PATRIOT renewal bill with much fewer surveillance reforms. Most notably, that bill did not contain any reforms to last year's FISA Amendments Act, which is <a href="http://www.eff.org/deeplinks/2009/09/patriot-act-debate-must-include-reform-last-years-">an even graver threat to Americans' privacy</a> than PATRIOT.</p>
<p>Well, that watered-down bill was watered down again when the mark-up began: Senator Leahy negotiated with Senator Feinstein, a member of the Judicary Committee and chair of the Intelligence Committee, to create a new bill containing even <em>fewer</em> reforms than the original Leahy bill. Especially disappointing was the new bill's failure to require that <a href="http://w2.eff.org/patriot/sunset/215.php">PATRIOT Section 215</a> orders for the hand-over of sensitive phone, internet and credit records be limited to records that pertain to a spy or terrorist. Unfortunately, it was this even more watered-down Leahy/Feinstein bill that the committee considered yesterday, and which it will continue to consider next Thursday.</p>
<p>Sadly, it's no surprise that Senator Feinstein would favor government power over individual privacy when it comes to debates over foreign intelligence surveillance, especially now that she is heading the Senate Intelligence Committee. But we expected more from Senator Leahy, who has often been a staunch defender of civil liberties and who supported a much broader range of privacy protections when PATRIOT came up for reauthorization in 2005. A <a href="http://leahy.senate.gov/press/200910/100109a.html">press release</a> from Senator Leahy applauded this new bill as representing progress, but we must respectfully disagree.</p>
<p>The next wag of the finger goes to all of the Democrats who failed to support Senator Durbin's amendment to fix the Leahy/Feinstein bill's most obvious deficiency by re-injecting the new, heightened standard for the issuance of 215 orders that was in the original Leahy bill. Those eight Democrats, many of whom have supported stronger PATRIOT reform in the past, were:</p>
<p>Senator Leahy of Vermont<br />
Senator Kohl of Wisconsin<br />
Senator Feinstein of California<br />
Senator Schumer of New York<br />
Senator Whitehouse of Rhode Island<br />
Senator Klobuchar of Minnesota<br />
Senator Kaufman of Delaware<br />
Senator Franken of Minnesota</p>
<p>We were especially disappointed--and made curious--by continued assertions by Senators Feinstein and Whitehouse that modifying the 215 standard would interfere with an ongoing classified intelligence program (the Administration has also noted the existence of this classified program that relies on 215 orders; <a href="http://emptywheel.firedoglake.com/">Emptywheel</a> at <a href="http://www.firedoglake.com">Firedoglake</a> has a nice round-up up those mentions <a href="http://emptywheel.firedoglake.com/2009/09/29/on-patriots-and-justice-what-we-dont-know/">here</a>). This kind of "you'd understand how I was voting if you knew the scary things I knew" posturing is Bush-era nonsense, and we agree with Senator Feingold that more information needs to be declassified so that Congress and America at large can have an informed debate about these spying authorities. He's received the same classified briefings, and he noted several times yesterday that the classified uses of 215 amounted to an abuse of power.</p>
<p>Speaking of Senator Feingold, he and Senator Durbin have earned a big tip of the hat for their tireless work to reform PATRIOT, and we especially congratulate Senator Feingold on the success of his amendment to rein in sneak and peek searches by shortening the time by which targets must be notified of a search from thirty days to one week. We hope that they both will continue to offer more privacy-protective amendments next week; Senator Feingold noted that he expected to introduce up to three more amendments. We look forward to seeing an amendment to add new checks and balances when it comes to <a href="http://w2.eff.org/patriot/sunset/505.php">National</a> <a href="http://www.eff.org/press/archives/2008/05/06">Security</a> <a href="http://www.eff.org/issues/foia/07656JDB">Letters</a>. We also hope that at least some of the amendments next week seek to <a href="http://www.eff.org/deeplinks/2009/09/patriot-act-debate-must-include-reform-last-years-">reform the FISA Amendments Act</a>, which broadly expanded the government's warrantless wiretapping authority and granted immunity to telecoms like AT&amp;T that broke the law by cooperating in the National Security Agency's warrantless wiretapping program.</p>
<p>Finally, we want to tip our hat to Senator Cardin and especially to the Democrats' newest member, Senator Specter, for joining with Senator Feingold to vote in support of Senator Durbin's 215 amendment. We hope that they will continue to do right by their constituents by supporting civil liberties reforms to PATRIOT and the FISA Amendments Act, and that the others who voted against Durbin's amendment will see next week as a new chance to demonstrate their commitment to surveillance reform.</p>
<p>However, we need your help to make that happen, so our last tip of the hat is to you, the concerned citizen. We still need your continuing help to make sure that the PATRIOT renewal process yields new privacy protections. So please, go to our action center now to <a href="https://secure.eff.org/site/Advocacy?cmd=display&amp;page=UserAction&amp;id=441">tell your Senator to support strong reforms like those in the JUSTICE Act</a> when amendments come up next week.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Tip%20of%20the%20Hat%2C%20Wag%20of%20the%20Finger%3A%20PATRIOT%20Edition&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/tip-hat-wag-finger-patriot-edition&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Tip%20of%20the%20Hat%2C%20Wag%20of%20the%20Finger%3A%20PATRIOT%20Edition&amp;u=https%3A//www.eff.org/ar/deeplinks/2009/10/tip-hat-wag-finger-patriot-edition" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2009/10/tip-hat-wag-finger-patriot-edition" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Tip%20of%20the%20Hat%2C%20Wag%20of%20the%20Finger%3A%20PATRIOT%20Edition&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/tip-hat-wag-finger-patriot-edition" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Fri, 02 Oct 2009 18:55:40 +0000Kevin Bankston60802 at https://www.eff.orgLegislative AnalysisPATRIOT ActPrivacyNSA SpyingNational Security LettersLiveblogging the Senate Judiciary PATRIOT Act Mark-Uphttps://www.eff.org/ar/deeplinks/2009/10/liveblogging-senate-judiciary-patriot-act-mark
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>This morning is the Senate Judiciary Committee's meeting to amend (or "mark up") and vote on USA PATRIOT Act renewal legislation; the discussion of PATRIOT is currently ongoing and you can watch the live webcast <a href="http://judiciary.senate.gov/webcast/livewebcast.cfm">here</a>.</p>
<p>So far, not so good. The first order of business was an amendment in the form of a substitute to Committee Chairman Leahy's base bill, which was negotiated between him and Senator Feinstein who heads the Intelligence Committee; that bill is <a href="http://juliansanchez.com/DiFiPatriot.pdf">here</a>. The amendment was accepted at the beginning of the mark-up without discussion.</p>
<p>This is both good and bad--the good news is that apparently, Intel will not be asserting jurisdiction over the PATRIOT renewal process and doing its own bill, which would ultimately be much worse than anything coming out of Judiciary. The bad is that the negotiated bill has even fewer PATRIOT reforms than the <a href="http://www.eff.org/deeplinks/2009/09/patriot-debate">original Leahy bill</a>, which already had much fewer reforms than the <a href="http://www.eff.org/deeplinks/2009/09/eff-supports-justice">Feingold/Durbin JUSTICE bill</a>. The reforms that the bill does contain, like the Leahy bill before it, only address PATRIOT and do not address <a href="http://www.eff.org/deeplinks/2009/09/patriot-act-debate-must-include-reform-last-years-">reform of the FISA Amendments Act</a> at all, unlike JUSTICE.</p>
<p>Next up, amendments: Senator Durbin offered an amendment based on JUSTICE, which would raise the standard for the issuance of PATRIOT Section 215 orders for business records. In a vote that likely scared off a lot of other potential reform amendments, the amendment failed--apparently by a large margin, although it's hard to hear the final results of the votes because the committee clerk doesn't have a microphone.</p>
<p>Things brightened a bit with the next amendment from Senator Feingold regarding sneak and peek search warrants, reducing the period during which the government may delay notice to the searched party from 30 days to 7 days, in order to bring that PATRIOT authority in line with court decisions finding that delay beyond 7 days violates the Fourth Amendment. That amendment passed--hurray!</p>
<p>Next, Senator Sessions argued for an amendment that would remove the sunset provision in the new bill that would let PATRIOT's National Security Letter provisions expire at the end of 2013. Woot!--the amendment failed.</p>
<p>UPDATE: COMMITTEE ADJOURNED: The committee has adjourned without considering other amendments; Senator Leahy insists that any remaining amendments (Feingold says he has 2 or 3) and a vote on final passage of the bill should occur at next Thursday's meeting. So, if you haven't voiced your support for surveillance reform yet, please <a href="https://secure.eff.org/site/Advocacy?cmd=display&amp;page=UserAction&amp;id=441">visit our action center now</a> and tell your Senator to support the reforms in the JUSTICE Act!</p>
<p>UPDATE: VOTE COUNTS: The <a href="http://judiciary.senate.gov/">Senate Judiciary Committee's page</a> now has the vote counts: the Leahy-Feinstein substitute was adopted by unanimous consent; Durbin's amendment on Section 215 lost 4 to 15; Feingold's amendment on sneak and peek searches passed 12 to 7; and Sessions' bill to remove the NSL sunset failed 6 to 12.</p>
</div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Liveblogging%20the%20Senate%20Judiciary%20PATRIOT%20Act%20Mark-Up&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/liveblogging-senate-judiciary-patriot-act-mark&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Liveblogging%20the%20Senate%20Judiciary%20PATRIOT%20Act%20Mark-Up&amp;u=https%3A//www.eff.org/ar/deeplinks/2009/10/liveblogging-senate-judiciary-patriot-act-mark" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2009/10/liveblogging-senate-judiciary-patriot-act-mark" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Liveblogging%20the%20Senate%20Judiciary%20PATRIOT%20Act%20Mark-Up&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/10/liveblogging-senate-judiciary-patriot-act-mark" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 01 Oct 2009 15:51:01 +0000Kevin Bankston60801 at https://www.eff.orgLegislative AnalysisPATRIOT ActPrivacyNational Security LettersEFF Supports JUSTICE Bill to Reform the USA PATRIOT Act and Repeal Telecom Immunityhttps://www.eff.org/ar/deeplinks/2009/09/eff-supports-justice
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>
On December 31, three provisions of the USA PATRIOT Act that broadly expanded government surveillance authority in the wake of 9/11 are set to expire.<a class="see-footnote" id="footnoteref1_czfpj14" title="Actually, although the three expiring provisions are commonly referred to in the press as being PATRIOT provisions, one of the expiring provisions — the so-called &quot;lone wolf&quot; wiretapping provision allowing the government to target for foreign intelligence surveillance individuals that have no link to any foreign power or terrorist organization — was actually passed as part of the Intelligence Reform and Terrorism Prevention Act of 2004." href="#footnote1_czfpj14">1</a> The Obama Administration made clear in a <a href="http://www.wired.com/images_blogs/threatlevel/2009/09/leahyletter.pdf">letter</a> this week to Senate Judiciary Committee Chairman Patrick Leahy that although the Justice Department supports reauthorization of those provisions, it is also open to discussing modifications to the law “to provide additional protection for the privacy of law abiding Americans.”
</p>
<p>
Today, Senators Russ Feingold and Dick Durbin — along with eight other Senators — have taken the Administration up on its offer by introducing the JUSTICE Act, which would rein in the worst excesses of PATRIOT and last year’s FISA Amendments Act (FAA). The announcement of the bill’s introduction, along with a fact sheet outlining the bill's details, is <a href="http://feingold.senate.gov/record.cfm?id=317927">here</a>; the text of the JUSTICE Act is <a href="http://www.eff.org/files/HEN09874.pdf">here</a> (the “JUSTICE”, if you’re wondering, stands for Judiciously Using Surveillance Tools In Counterterrorism Efforts”).
</p>
<p>
The JUSTICE Act would renew two of the three expiring PATRIOT provisions, PATRIOT sections <a href="http://w2.eff.org/patriot/sunset/206.php">206</a> (John Doe roving wiretaps) and <a href="http://w2.eff.org/patriot/sunset/215.php">215</a> (FISA orders for any tangible thing), but would also add strong new checks and balances to those provisions and to the PATRIOT Act in general, especially those provisions dealing with the government’s authority to issue <a href="http://w2.eff.org/patriot/sunset/505.php">National</a> <a href="http://www.eff.org/press/archives/2008/05/06">Security</a> <a href="http://www.eff.org/issues/foia/07656JDB">Letters</a>. If passed, the bill would also establish critically important protections for Americans against surveillance authorized under the FAA. Of particular importance to EFF's clients in the <a href="http://www.eff.org/cases/hepting">Hepting v. AT&amp;T</a> case and to the preservation of the rule of law, JUSTICE would completely repeal the FAA provision intended to legally immunize telecoms like AT&amp;T that illegally assisted in the National Security Agency's <a href="http://www.eff.org/issues/nsa-spying">warrantless wiretapping program</a>. Last summer when Congress passed the FAA, Senate Majority Leader Harry Reid stated his intention to revisit that law as part of the PATRIOT renewal debate, and we're very glad that Senators Feingold and Durbin have kick-started that process.
</p>
<p>
We'll be blogging more about the JUSTICE Act and other PATRIOT-related proposals in anticipation of the Senate Judiciary Committee's <a href="http://judiciary.senate.gov/hearings/hearing.cfm?id=4062">hearing next week</a> on PATRIOT reauthorization, and we'll alert you when the time is ripe for you to contact Congress through our <a href="http://www.eff.org/action">Action Center</a> and voice your support for PATRIOT reform. In the meantime, EFF applauds Senators Feingold and Durbin, as well as cosponsoring Senators Akaka, Bingaman, Menendez, Merkley, Sanders, Tester, Udall, and Wyden, for their continuing hard work to protect Americans' civil liberties. EFF would prefer that none of the expiring PATRIOT provisions be renewed, but if they are, they absolutely must be accompanied by meaningful new checks and balances like those introduced today. It's time that JUSTICE was restored.
</p>
<ul class="footnotes"><li class="footnote" id="footnote1_czfpj14"><a class="footnote-label" href="#footnoteref1_czfpj14">1.</a> Actually, although the three expiring provisions are commonly referred to in the press as being PATRIOT provisions, one of the expiring provisions — the so-called "lone wolf" wiretapping provision allowing the government to target for foreign intelligence surveillance individuals that have no link to any foreign power or terrorist organization — was actually passed as part of the Intelligence Reform and Terrorism Prevention Act of 2004.</li>
</ul></div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/issues/foia/07403TFH">Foreign Intelligence Surveillance Court Orders</a></div><div class="field-item odd"><a href="/ar/issues/foia/07656JDB">National Security Letters (NSLs)</a></div><div class="field-item even"><a href="/ar/cases/hepting">Hepting v. AT&amp;T</a></div><div class="field-item odd"><a href="/ar/cases/jewel">Jewel v. NSA</a></div><div class="field-item even"><a href="/ar/foia/pen-registers">Pen Registers</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=EFF%20Supports%20JUSTICE%20Bill%20to%20Reform%20the%20USA%20PATRIOT%20Act%20and%20Repeal%20Telecom%20Immunity&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/09/eff-supports-justice&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=EFF%20Supports%20JUSTICE%20Bill%20to%20Reform%20the%20USA%20PATRIOT%20Act%20and%20Repeal%20Telecom%20Immunity&amp;u=https%3A//www.eff.org/ar/deeplinks/2009/09/eff-supports-justice" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2009/09/eff-supports-justice" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=EFF%20Supports%20JUSTICE%20Bill%20to%20Reform%20the%20USA%20PATRIOT%20Act%20and%20Repeal%20Telecom%20Immunity&amp;url=https%3A//www.eff.org/ar/deeplinks/2009/09/eff-supports-justice" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Thu, 17 Sep 2009 22:12:50 +0000Kevin Bankston60785 at https://www.eff.orgLegislative AnalysisTransparencyPATRIOT ActPrivacyNSA SpyingNational Security LettersSecond Circuit Rules Against National Security Letter Gag Ordershttps://www.eff.org/ar/deeplinks/2008/12/second-circuit-rules-against-national-security-let
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Today, the federal Second Circuit Court of Appeals gave another setback to the Bush Administration's claims for sweeping new Executive powers. The court found the <a href="http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00002709----000-.html">National Security Letter (NSL) statute's</a> gag provision unconstitutional in <a href="http://www.ca2.uscourts.gov:8080/isysnative/RDpcT3BpbnNcT1BOXDA3LTQ5NDMtY3Zfb3BuLnBkZg==/07-4943-cv_opn.pdf#xml=http://www.ca2.uscourts.gov:8080/isysquery/irl4910/1/hilite">Doe v. Mukasey</a>. The NSL law allows the government to seek your electronic communications transactional records from your ISP without obtaining a court order. The gag provisions required the recipient of a NSL to stay quiet as long as the government desired, with only a fig leaf of judicial review. </p>
<p>The fig leaf was not good enough to satisfy the First Amendment. The Second Circuit struck down the statute's truncated judicial review provisions, which required the court to treat the FBI's assertions as conclusive absent evidence of bad faith. In addition, the government was required to initiate judicial proceedings to enforce the gag, instead of the ISP who received the NSL. The Court also construed several controversial aspects of the NSL statute narrowly, substantially reducing the scope of the FBI's gag power. </p>
<p>The Second Circuit allowed the FBI to continue to issue NSL to communications service providers, but only pursuant to the new narrower interpretation. The Court did not address the Fourth Amendment implications of NSLs, since the government had withdrawn the NSL at issue before the court ruled, leaving the gag order as the only live issue. District Court Judge Marrero's <a href="http://www.eff.org/deeplinks/2007/09/court-rules-national-security-letters-unconstitutional">prior decision</a> is also worth reading. </p>
<p>The ACLU represents the Doe plaintiff subject to the gag order. EFF, along with the National Security Archive, submitted an <a href="http://www.eff.org/press/archives/2008/03/20">amicus brief</a> in support of the Doe plaintiff.</p>
</div></div></div><div class="field field-name-field-related-cases field-type-node-reference field-label-above"><div class="field-label">Related Cases:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/ar/cases/doe-v-gonzalez-doe-v-ashcroft">Doe v. Mukasey (Doe v. Gonzalez Doe v. Ashcroft)</a></div></div></div><div class="share-links" style="margin-bottom:10px"><br/>Share this: <a href="https://twitter.com/intent/tweet?text=Second%20Circuit%20Rules%20Against%20National%20Security%20Letter%20Gag%20Orders&amp;url=https%3A//www.eff.org/ar/deeplinks/2008/12/second-circuit-rules-against-national-security-let&amp;related=eff&amp;via=eff" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/twitter48.png" alt="Share on Twitter" /></a> <a href="https://www.facebook.com/share.php?t=Second%20Circuit%20Rules%20Against%20National%20Security%20Letter%20Gag%20Orders&amp;u=https%3A//www.eff.org/ar/deeplinks/2008/12/second-circuit-rules-against-national-security-let" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/facebook48.png" alt="Share on Facebook" /></a> <a href="https://plus.google.com/share?url=https%3A//www.eff.org/ar/deeplinks/2008/12/second-circuit-rules-against-national-security-let" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/gplus48.png" alt="Share on Google+" /></a> <a href="https://sharetodiaspora.github.com/?title=Second%20Circuit%20Rules%20Against%20National%20Security%20Letter%20Gag%20Orders&amp;url=https%3A//www.eff.org/ar/deeplinks/2008/12/second-circuit-rules-against-national-security-let" target="_blank"><img src="https://www.eff.org/sites/all/themes/frontier/supporters/images/diaspora48.png" alt="Share on Diaspora" /></a> <a href="https://supporters.eff.org/join" style="background-color:#cc0000; color:#ffffff; text-decoration:none; cursor:pointer; padding:5px 8px; font-family:verdana; font-weight:bold; border-radius:8px; text-shadow: 1px 1px #660000; text-transform:uppercase;">Join EFF</a></div>Tue, 16 Dec 2008 00:48:46 +0000Kurt Opsahl60535 at https://www.eff.orgNews UpdateNational Security Letters